Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:7200 - Security Advisory
Issued:
2024-02-27
Updated:
2024-02-27

RHSA-2023:7200 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: OpenShift Container Platform 4.15.z security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Red Hat build of MicroShift release 4.15.0 is now available with updates to packages and images that fix several bugs.

This release includes a security update for Red Hat build of MicroShift 4.15.0.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at
the edge, providing an efficient way to operate single-node clusters in these low-resource environments.

This advisory contains the RPM packages for Red Hat build of MicroShift 4.15.0. Read the following advisory for the container images for this
release:

https://access.redhat.com/errata/RHSA-2023:7198

Security Fix(es):

  • golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)
  • golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)
  • golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For Red Hat build of MicroShift 4.15, read the following documentation for important instructions on how to install the latest RPMs and fully apply this asynchronous errata update:

https://access.redhat.com/documentation/en-us/red_hat_build_of_microshift/4.15/html/release_notes/index

Affected Products

  • Red Hat OpenShift Container Platform 4.15 for RHEL 9 x86_64
  • Red Hat OpenShift Container Platform for ARM 64 4.15 for RHEL 9 aarch64

Fixes

  • BZ - 2243296 - CVE-2023-39325 golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
  • BZ - 2253193 - CVE-2023-45287 golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.
  • BZ - 2253330 - CVE-2023-39326 golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests
  • OCPBUGS-18548 - MicroShift's KAS and KCM are not shutting down
  • OCPBUGS-19288 - Update 4.15 ovn-kubernetes-microshift image to be consistent with ART
  • OCPBUGS-19363 - systemd-resolved breaks microshift DNS pod
  • OCPBUGS-19384 - Test harness: migrate from envsubst to gomplate
  • OCPBUGS-19422 - no builtin components should report permission issues
  • OCPBUGS-19433 - Ingress rules not checked in tests
  • OCPBUGS-19457 - Missing upgrade test from "released RPMs" (ECs, RCs, Z-streams)
  • OCPBUGS-19488 - cannot upgrade microshift 4.14 ec4 to rc1
  • OCPBUGS-19540 - MicroShift doesn't print its version at the start
  • OCPBUGS-19567 - Sos report helper to include full system journal
  • OCPBUGS-19632 - Upgrade over unhealthy system leads to data loss
  • OCPBUGS-19719 - mDNS resolution not working when retrieving logs
  • OCPBUGS-20037 - Greenboot health check logs do not belong to the unit
  • OCPBUGS-22685 - Update library-go in MicroShift 4.14
  • OCPBUGS-22809 - microshift-selinux rpm post scriptlet fails
  • OCPBUGS-22936 - microshift-data-cleanup fails if crio is not running
  • OCPBUGS-22322 - Restart of MicroShift causes premature backup which will prevent creation of right backup
  • OCPBUGS-22338 - No immediately obvious way to get the etcd version
  • OCPBUGS-22858 - error printed greenboot-healthcheck output if system is non ostree-based
  • OCPBUGS-22854 - microshift-release-info as a dependency on microshift
  • OCPBUGS-25689 - MicroShift greenboot reports RED when no volume groups exist
  • OCPBUGS-25851 - MicroShift OLM RPM is missing its release info file
  • OCPBUGS-25904 - [release-4.15] MicroShift's cleanup script should stop and delete all (including user's) Pods
  • OCPBUGS-27398 - Setting the advertiseAddress in the microshift config.yaml file leads to CrashLoopBackOff for the ovnkube-master pod
  • OCPBUGS-27855 - [MicroShift] SERVFAIL due to "[ERROR] plugin/errors: dns: overflowing header size"

CVEs

  • CVE-2023-39325
  • CVE-2023-39326
  • CVE-2023-45287

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://access.redhat.com/security/vulnerabilities/RHSB-2023-003
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenShift Container Platform 4.15 for RHEL 9

SRPM
microshift-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.src.rpm SHA-256: b6f215b47bef53c7b0af7612f5d4b5a93da83b99d6251e16b5d8ab215b30da12
x86_64
microshift-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.x86_64.rpm SHA-256: d7342e289e70a0ed66eddc1d12b50f5f35ae50b14dd5796dd5f05a1d6d6a65bf
microshift-greenboot-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.noarch.rpm SHA-256: 5e3dce88972903c9c75d6dbc4546d129cf5e0c75d51de069148881277d119614
microshift-networking-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.x86_64.rpm SHA-256: 3e9c1b304b7231ad97751e0ab1feaf63d0e5451360b5214513d88aeb2b746f5f
microshift-olm-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.x86_64.rpm SHA-256: f384a4c60dfb24e77d452cea22aa68314dda3ff35915d32f749a7e6739d3323d
microshift-release-info-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.noarch.rpm SHA-256: b27f68598bf51816e22e08fe8b902cddd7905726a288540ea2eb427d32f518b8
microshift-selinux-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.noarch.rpm SHA-256: 0e63a310777df854dbe7428ea13802c20c84796b07ff363d3e65a2e2dadba2fb

Red Hat OpenShift Container Platform for Power 4.15 for RHEL 9

SRPM
microshift-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.src.rpm SHA-256: b6f215b47bef53c7b0af7612f5d4b5a93da83b99d6251e16b5d8ab215b30da12
ppc64le

Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.15 for RHEL 9

SRPM
microshift-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.src.rpm SHA-256: b6f215b47bef53c7b0af7612f5d4b5a93da83b99d6251e16b5d8ab215b30da12
s390x

Red Hat OpenShift Container Platform for ARM 64 4.15 for RHEL 9

SRPM
microshift-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.src.rpm SHA-256: b6f215b47bef53c7b0af7612f5d4b5a93da83b99d6251e16b5d8ab215b30da12
aarch64
microshift-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.aarch64.rpm SHA-256: a9a8523793e27c854b169c2ba9f7e982813142c5b0b2e36a23b41c3ea91e14db
microshift-greenboot-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.noarch.rpm SHA-256: 5e3dce88972903c9c75d6dbc4546d129cf5e0c75d51de069148881277d119614
microshift-networking-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.aarch64.rpm SHA-256: 7297d6e1b196174683d45fddff2d1a5158e85955423e11d096c34986a11cd199
microshift-olm-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.aarch64.rpm SHA-256: ecb8bbdedaf7216ce65496d49551b66c96f3f1f8a335299a3881f66de12d233d
microshift-release-info-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.noarch.rpm SHA-256: b27f68598bf51816e22e08fe8b902cddd7905726a288540ea2eb427d32f518b8
microshift-selinux-4.15.0-202402260721.p0.g799289b.assembly.4.15.0.el9.noarch.rpm SHA-256: 0e63a310777df854dbe7428ea13802c20c84796b07ff363d3e65a2e2dadba2fb

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility