SUSE update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-t



| Updated: 2024-12-06
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-44487
CWE-ID CWE-400
Exploitation vector Network
Public exploit Vulnerability #1 is being exploited in the wild.
Vulnerable software
SUSE Linux Enterprise Micro
Operating systems & Components / Operating system

Containers Module
Operating systems & Components / Operating system

SUSE Linux Enterprise Server for SAP Applications 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Server 15
Operating systems & Components / Operating system

SUSE Linux Enterprise Real Time 15
Operating systems & Components / Operating system

SUSE Linux Enterprise High Performance Computing 15
Operating systems & Components / Operating system

openSUSE Leap
Operating systems & Components / Operating system

kubevirt-container-disk
Operating systems & Components / Operating system package or component

kubevirt-virt-operator-debuginfo
Operating systems & Components / Operating system package or component

kubevirt-manifests
Operating systems & Components / Operating system package or component

kubevirt-tests-debuginfo
Operating systems & Components / Operating system package or component

obs-service-kubevirt_containers_meta
Operating systems & Components / Operating system package or component

kubevirt-tests
Operating systems & Components / Operating system package or component

kubevirt-virtctl-debuginfo
Operating systems & Components / Operating system package or component

kubevirt-virt-handler
Operating systems & Components / Operating system package or component

kubevirt-pr-helper-conf
Operating systems & Components / Operating system package or component

kubevirt-virt-exportproxy-debuginfo
Operating systems & Components / Operating system package or component

kubevirt-virt-handler-debuginfo
Operating systems & Components / Operating system package or component

kubevirt-virt-exportserver-debuginfo
Operating systems & Components / Operating system package or component

kubevirt-virt-controller-debuginfo
Operating systems & Components / Operating system package or component

kubevirt-virt-controller
Operating systems & Components / Operating system package or component

kubevirt-virt-operator
Operating systems & Components / Operating system package or component

kubevirt-virt-api-debuginfo
Operating systems & Components / Operating system package or component

kubevirt-virt-launcher
Operating systems & Components / Operating system package or component

kubevirt-virt-api
Operating systems & Components / Operating system package or component

kubevirt-virt-launcher-debuginfo
Operating systems & Components / Operating system package or component

kubevirt-virt-exportserver
Operating systems & Components / Operating system package or component

kubevirt-virt-exportproxy
Operating systems & Components / Operating system package or component

kubevirt-virtctl
Operating systems & Components / Operating system package or component

kubevirt-container-disk-debuginfo
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Resource exhaustion

EUVDB-ID: #VU81728

Risk: High

CVSSv4.0: 6.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2023-44487

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improperly control of consumption for internal resources when handling HTTP/2 requests with compressed HEADERS frames. A remote attacker can send a sequence of compressed HEADERS frames followed by RST_STREAM frames and perform a denial of service (DoS) attack, a.k.a. "Rapid Reset".

Note, the vulnerability is being actively exploited in the wild.

Mitigation

Update the affected package kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-t to the latest version.

Vulnerable software versions

SUSE Linux Enterprise Micro: 5.5

Containers Module: 15-SP5

SUSE Linux Enterprise Server for SAP Applications 15: SP5

SUSE Linux Enterprise Server 15: SP5

SUSE Linux Enterprise Real Time 15: SP5

SUSE Linux Enterprise High Performance Computing 15: SP5

openSUSE Leap: 15.5

kubevirt-container-disk: before 1.1.0-150500.8.6.1

kubevirt-virt-operator-debuginfo: before 1.1.0-150500.8.6.1

kubevirt-manifests: before 1.1.0-150500.8.6.1

kubevirt-tests-debuginfo: before 1.1.0-150500.8.6.1

obs-service-kubevirt_containers_meta: before 1.1.0-150500.8.6.1

kubevirt-tests: before 1.1.0-150500.8.6.1

kubevirt-virtctl-debuginfo: before 1.1.0-150500.8.6.1

kubevirt-virt-handler: before 1.1.0-150500.8.6.1

kubevirt-pr-helper-conf: before 1.1.0-150500.8.6.1

kubevirt-virt-exportproxy-debuginfo: before 1.1.0-150500.8.6.1

kubevirt-virt-handler-debuginfo: before 1.1.0-150500.8.6.1

kubevirt-virt-exportserver-debuginfo: before 1.1.0-150500.8.6.1

kubevirt-virt-controller-debuginfo: before 1.1.0-150500.8.6.1

kubevirt-virt-controller: before 1.1.0-150500.8.6.1

kubevirt-virt-operator: before 1.1.0-150500.8.6.1

kubevirt-virt-api-debuginfo: before 1.1.0-150500.8.6.1

kubevirt-virt-launcher: before 1.1.0-150500.8.6.1

kubevirt-virt-api: before 1.1.0-150500.8.6.1

kubevirt-virt-launcher-debuginfo: before 1.1.0-150500.8.6.1

kubevirt-virt-exportserver: before 1.1.0-150500.8.6.1

kubevirt-virt-exportproxy: before 1.1.0-150500.8.6.1

kubevirt-virtctl: before 1.1.0-150500.8.6.1

kubevirt-container-disk-debuginfo: before 1.1.0-150500.8.6.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2023/suse-su-20234624-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.



###SIDEBAR###