Headline
Red Hat Security Advisory 2023-5407-01
Red Hat Security Advisory 2023-5407-01 - OpenShift GitOps KAM OpenShift GitOps Kubernetes Application Manager CLI tool. Issues addressed include a denial of service vulnerability.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: openshift-gitops-kam security update
Advisory ID: RHSA-2023:5407-01
Product: Red Hat OpenShift GitOps
Advisory URL: https://access.redhat.com/errata/RHSA-2023:5407
Issue date: 2023-09-29
CVE Names: CVE-2023-37788
=====================================================================
- Summary:
An update for openshift-gitops-kam is now available for Red Hat OpenShift
GitOps 1.10.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat OpenShift GitOps 1.10 - aarch64, ppc64le, s390x, x86_64
- Description:
OpenShift GitOps KAM OpenShift GitOps Kubernetes Application Manager CLI
tool
Security Fix(es):
- goproxy: Denial of service (DoS) via unspecified vectors (CVE-2023-37788)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
2224245 - CVE-2023-37788 goproxy: Denial of service (DoS) via unspecified vectors.
- Package List:
Red Hat OpenShift GitOps 1.10:
Source:
openshift-gitops-kam-1.10.0-34.el8.src.rpm
aarch64:
openshift-gitops-kam-1.10.0-34.el8.aarch64.rpm
ppc64le:
openshift-gitops-kam-1.10.0-34.el8.ppc64le.rpm
s390x:
openshift-gitops-kam-1.10.0-34.el8.s390x.rpm
x86_64:
openshift-gitops-kam-1.10.0-34.el8.x86_64.rpm
openshift-gitops-kam-redistributable-1.10.0-34.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2023-37788
https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=juqU
-----END PGP SIGNATURE-----
–
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Related news
Red Hat Security Advisory 2024-3479-03 - Updated container images are now available for director Operator for Red Hat OpenStack Platform 16.2 for RHEL 8.4. Issues addressed include a denial of service vulnerability.
An update for openshift-gitops-kam is now available for Red Hat OpenShift GitOps 1.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-37788: A flaw was found in goproxy, which is vulnerable to a denial of service caused by improper input validation. This flaw allows a remote attacker can cause the goproxy server to crash by sending a specially crafted HTTP request to the HTTPS page, replacing the path "/" with an asterisk "*".
goproxy v1.1 was discovered to contain an issue which can lead to a Denial of service (DoS) via unspecified vectors.
goproxy v1.1 was discovered to contain an issue which can lead to a Denial of service (DoS) via unspecified vectors.