RHCOS 3 : OpenShift 容器平台 3.11 HTTP/2 (RHSA-2019:3906)

high Nessus 插件 ID 312525

简介

远程的 Red Hat CoreOS 主机缺少一个或多个 OpenShift 容器平台 3.11 HTTP/2 的安全更新。

描述

远程 Red Hat Enterprise Linux CoreOS 3 主机上安装的程序包受到 RHSA-2019:3906 公告中提及的多个漏洞影响。

- HTTP/2:使用 PING 帧的洪流导致无限制内存增长 (CVE-2019-9512)

- HTTP/2:使用 HEADERS 帧的洪流导致过度资源消耗 (CVE-2019-9514)

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

根据 中的指导RHSA-2019:3906更新 RHCOS OpenShift 容器平台 3.11 HTTP/2 包。

另见

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=1735645

https://bugzilla.redhat.com/show_bug.cgi?id=1735744

http://www.nessus.org/u?84812716

https://access.redhat.com/errata/RHSA-2019:3906

插件详情

严重性: High

ID: 312525

文件名: rhcos-RHSA-2019-3906.nasl

版本: 1.1

类型: Local

代理: unix

发布时间: 2026/5/6

最近更新时间: 2026/5/6

支持的传感器: Nessus Agent, Continuous Assessment, Nessus

风险信息

VPR

风险因素: Medium

分数: 4.4

Vendor

Vendor Severity: Important

CVSS v2

风险因素: High

基本分数: 7.8

时间分数: 5.8

矢量: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS 分数来源: CVE-2019-9514

CVSS v3

风险因素: High

基本分数: 7.5

时间分数: 6.5

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:redhat:enterprise_linux:atomic-openshift-web-console, p-cpe:/a:redhat:enterprise_linux:heapster, p-cpe:/a:redhat:enterprise_linux:cockpit, p-cpe:/a:redhat:enterprise_linux:golang-github-openshift-prometheus-alert-buffer, p-cpe:/a:redhat:enterprise_linux:openshift-eventrouter, p-cpe:/a:redhat:enterprise_linux:openshift-external-storage-cephfs-provisioner, p-cpe:/a:redhat:enterprise_linux:openshift-external-storage-efs-provisioner, p-cpe:/a:redhat:enterprise_linux:openshift-external-storage-local-provisioner, p-cpe:/a:redhat:enterprise_linux:openshift-external-storage-manila-provisioner, p-cpe:/a:redhat:enterprise_linux:openshift-external-storage-snapshot-controller, p-cpe:/a:redhat:enterprise_linux:openshift-external-storage-snapshot-provisioner, p-cpe:/a:redhat:enterprise_linux:cockpit-kubernetes, p-cpe:/a:redhat:enterprise_linux:image-inspector, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-descheduler, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-node-problem-detector, p-cpe:/a:redhat:enterprise_linux:prometheus-node-exporter, p-cpe:/a:redhat:enterprise_linux:atomic-enterprise-service-catalog, p-cpe:/a:redhat:enterprise_linux:atomic-enterprise-service-catalog-svcat, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-cluster-autoscaler, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-metrics-server, p-cpe:/a:redhat:enterprise_linux:atomic-openshift-service-idler, p-cpe:/a:redhat:enterprise_linux:golang-github-openshift-oauth-proxy, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-autoheal, p-cpe:/a:redhat:enterprise_linux:openshift-enterprise-cluster-capacity, p-cpe:/a:redhat:enterprise_linux:prometheus, p-cpe:/a:redhat:enterprise_linux:prometheus-alertmanager, p-cpe:/a:redhat:enterprise_linux:csi-attacher, p-cpe:/a:redhat:enterprise_linux:csi-driver-registrar, p-cpe:/a:redhat:enterprise_linux:csi-livenessprobe, p-cpe:/a:redhat:enterprise_linux:csi-provisioner, p-cpe:/a:redhat:enterprise_linux:hawkular-openshift-agent, cpe:/o:redhat:enterprise_linux:7:coreos, p-cpe:/a:redhat:enterprise_linux:golang-github-prometheus-alertmanager, p-cpe:/a:redhat:enterprise_linux:golang-github-prometheus-node_exporter, p-cpe:/a:redhat:enterprise_linux:golang-github-prometheus-prometheus, p-cpe:/a:redhat:enterprise_linux:openshift-external-storage

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

易利用性: No known exploits are available

补丁发布日期: 2019/11/18

漏洞发布日期: 2019/8/9

参考资料信息

CVE: CVE-2019-9512, CVE-2019-9514

CWE: 400

RHSA: 2019:3906