Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2023-4093-01

Red Hat Security Advisory 2023-4093-01 - Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.5. Issues addressed include a denial of service vulnerability.

Packet Storm
#vulnerability#web#linux#red_hat#dos#redis#git#kubernetes#pdf#rpm#ssl

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: OpenShift Container Platform 4.13.5 security update
Advisory ID: RHSA-2023:4093-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2023:4093
Issue date: 2023-07-20
CVE Names: CVE-2023-1260 CVE-2023-3089 CVE-2023-24534
CVE-2023-24536 CVE-2023-24537 CVE-2023-24538
CVE-2023-24539 CVE-2023-27561 CVE-2023-29400
=====================================================================

  1. Summary:

Red Hat OpenShift Container Platform release 4.13.5 is now available with
updates to packages and images that fix several bugs and add enhancements.

This release includes a security update for Red Hat OpenShift Container
Platform 4.13.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Ironic content for Red Hat OpenShift Container Platform 4.13 - noarch
Red Hat OpenShift Container Platform 4.13 - aarch64, noarch, ppc64le, s390x, x86_64

  1. Description:

Red Hat OpenShift Container Platform is Red Hat’s cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.13.5. See the following advisory for the container images for
this release:

https://access.redhat.com/errata/RHSA-2023:4091

Security Fix(es):

  • openshift: OCP & FIPS mode (CVE-2023-3089)

  • kube-apiserver: PrivEsc (CVE-2023-1260)

  • golang: net/http, net/textproto: denial of service from excessive memory
    allocation (CVE-2023-24534)

  • golang: net/http, net/textproto, mime/multipart: denial of service from
    excessive resource consumption (CVE-2023-24536)

  • golang: go/parser: Infinite loop in parsing (CVE-2023-24537)

  • golang: html/template: backticks not treated as string delimiters
    (CVE-2023-24538)

  • golang: html/template: improper sanitization of CSS values
    (CVE-2023-24539)

  • runc: volume mount race condition (regression of CVE-2019-19921)
    (CVE-2023-27561)

  • golang: html/template: improper handling of empty HTML attributes
    (CVE-2023-29400)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

All OpenShift Container Platform 4.13 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift CLI (oc)
or web console. Instructions for upgrading a cluster are available at
https://docs.openshift.com/container-platform/4.13/updating/updating-cluster-cli.html

  1. Solution:

For OpenShift Container Platform 4.13 see the following documentation,
which will be updated shortly for this release, for important instructions
on how to upgrade your cluster and fully apply this asynchronous errata
update:

https://docs.openshift.com/container-platform/4.13/release_notes/ocp-4-13-release-notes.html

  1. Bugs fixed (https://bugzilla.redhat.com/):

2175721 - CVE-2023-27561 runc: volume mount race condition (regression of CVE-2019-19921)
2176267 - CVE-2023-1260 kube-apiserver: PrivEsc
2184481 - CVE-2023-24538 golang: html/template: backticks not treated as string delimiters
2184482 - CVE-2023-24536 golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption
2184483 - CVE-2023-24534 golang: net/http, net/textproto: denial of service from excessive memory allocation
2184484 - CVE-2023-24537 golang: go/parser: Infinite loop in parsing
2196026 - CVE-2023-24539 golang: html/template: improper sanitization of CSS values
2196029 - CVE-2023-29400 golang: html/template: improper handling of empty HTML attributes
2212085 - CVE-2023-3089 openshift: OCP & FIPS mode

  1. Package List:

Red Hat OpenShift Container Platform 4.13:

Source:
container-selinux-2.215.0-1.rhaos4.13.el8.src.rpm
containernetworking-plugins-1.0.1-8.rhaos4.13.el8.src.rpm
cri-o-1.26.3-10.rhaos4.13.git78941bf.el8.src.rpm
nmstate-2.2.12-1.rhaos4.13.el8.src.rpm
openshift-4.13.0-202307132344.p0.gf245ced.assembly.stream.el8.src.rpm
openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el8.src.rpm
openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el8.src.rpm
openshift-kuryr-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.src.rpm
openshift4-aws-iso-4.13.0-202306230038.p0.gd2acdd5.assembly.stream.el8.src.rpm

aarch64:
containernetworking-plugins-1.0.1-8.rhaos4.13.el8.aarch64.rpm
containernetworking-plugins-debuginfo-1.0.1-8.rhaos4.13.el8.aarch64.rpm
containernetworking-plugins-debugsource-1.0.1-8.rhaos4.13.el8.aarch64.rpm
cri-o-1.26.3-10.rhaos4.13.git78941bf.el8.aarch64.rpm
cri-o-debuginfo-1.26.3-10.rhaos4.13.git78941bf.el8.aarch64.rpm
cri-o-debugsource-1.26.3-10.rhaos4.13.git78941bf.el8.aarch64.rpm
nmstate-2.2.12-1.rhaos4.13.el8.aarch64.rpm
nmstate-debuginfo-2.2.12-1.rhaos4.13.el8.aarch64.rpm
nmstate-debugsource-2.2.12-1.rhaos4.13.el8.aarch64.rpm
nmstate-devel-2.2.12-1.rhaos4.13.el8.aarch64.rpm
nmstate-libs-2.2.12-1.rhaos4.13.el8.aarch64.rpm
nmstate-libs-debuginfo-2.2.12-1.rhaos4.13.el8.aarch64.rpm
openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el8.aarch64.rpm
openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el8.aarch64.rpm

noarch:
container-selinux-2.215.0-1.rhaos4.13.el8.noarch.rpm
openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el8.noarch.rpm
openshift-ansible-test-4.13.0-202306230038.p0.g148be47.assembly.stream.el8.noarch.rpm
openshift-kuryr-cni-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm
openshift-kuryr-common-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm
openshift-kuryr-controller-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm
openshift4-aws-iso-4.13.0-202306230038.p0.gd2acdd5.assembly.stream.el8.noarch.rpm
python3-kuryr-kubernetes-4.13.0-202306281017.p0.g5baee73.assembly.stream.el8.noarch.rpm

ppc64le:
containernetworking-plugins-1.0.1-8.rhaos4.13.el8.ppc64le.rpm
containernetworking-plugins-debuginfo-1.0.1-8.rhaos4.13.el8.ppc64le.rpm
containernetworking-plugins-debugsource-1.0.1-8.rhaos4.13.el8.ppc64le.rpm
cri-o-1.26.3-10.rhaos4.13.git78941bf.el8.ppc64le.rpm
cri-o-debuginfo-1.26.3-10.rhaos4.13.git78941bf.el8.ppc64le.rpm
cri-o-debugsource-1.26.3-10.rhaos4.13.git78941bf.el8.ppc64le.rpm
nmstate-2.2.12-1.rhaos4.13.el8.ppc64le.rpm
nmstate-debuginfo-2.2.12-1.rhaos4.13.el8.ppc64le.rpm
nmstate-debugsource-2.2.12-1.rhaos4.13.el8.ppc64le.rpm
nmstate-devel-2.2.12-1.rhaos4.13.el8.ppc64le.rpm
nmstate-libs-2.2.12-1.rhaos4.13.el8.ppc64le.rpm
nmstate-libs-debuginfo-2.2.12-1.rhaos4.13.el8.ppc64le.rpm
openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el8.ppc64le.rpm
openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el8.ppc64le.rpm

s390x:
containernetworking-plugins-1.0.1-8.rhaos4.13.el8.s390x.rpm
containernetworking-plugins-debuginfo-1.0.1-8.rhaos4.13.el8.s390x.rpm
containernetworking-plugins-debugsource-1.0.1-8.rhaos4.13.el8.s390x.rpm
cri-o-1.26.3-10.rhaos4.13.git78941bf.el8.s390x.rpm
cri-o-debuginfo-1.26.3-10.rhaos4.13.git78941bf.el8.s390x.rpm
cri-o-debugsource-1.26.3-10.rhaos4.13.git78941bf.el8.s390x.rpm
nmstate-2.2.12-1.rhaos4.13.el8.s390x.rpm
nmstate-debuginfo-2.2.12-1.rhaos4.13.el8.s390x.rpm
nmstate-debugsource-2.2.12-1.rhaos4.13.el8.s390x.rpm
nmstate-devel-2.2.12-1.rhaos4.13.el8.s390x.rpm
nmstate-libs-2.2.12-1.rhaos4.13.el8.s390x.rpm
nmstate-libs-debuginfo-2.2.12-1.rhaos4.13.el8.s390x.rpm
openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el8.s390x.rpm
openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el8.s390x.rpm

x86_64:
containernetworking-plugins-1.0.1-8.rhaos4.13.el8.x86_64.rpm
containernetworking-plugins-debuginfo-1.0.1-8.rhaos4.13.el8.x86_64.rpm
containernetworking-plugins-debugsource-1.0.1-8.rhaos4.13.el8.x86_64.rpm
cri-o-1.26.3-10.rhaos4.13.git78941bf.el8.x86_64.rpm
cri-o-debuginfo-1.26.3-10.rhaos4.13.git78941bf.el8.x86_64.rpm
cri-o-debugsource-1.26.3-10.rhaos4.13.git78941bf.el8.x86_64.rpm
nmstate-2.2.12-1.rhaos4.13.el8.x86_64.rpm
nmstate-debuginfo-2.2.12-1.rhaos4.13.el8.x86_64.rpm
nmstate-debugsource-2.2.12-1.rhaos4.13.el8.x86_64.rpm
nmstate-devel-2.2.12-1.rhaos4.13.el8.x86_64.rpm
nmstate-libs-2.2.12-1.rhaos4.13.el8.x86_64.rpm
nmstate-libs-debuginfo-2.2.12-1.rhaos4.13.el8.x86_64.rpm
openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el8.x86_64.rpm
openshift-clients-redistributable-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el8.x86_64.rpm
openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el8.x86_64.rpm

Red Hat OpenShift Container Platform 4.13:

Source:
cri-o-1.26.3-11.rhaos4.13.git78941bf.el9.src.rpm
kernel-5.14.0-284.23.1.el9_2.src.rpm
kernel-rt-5.14.0-284.23.1.rt14.308.el9_2.src.rpm
openshift-4.13.0-202307132344.p0.gf245ced.assembly.stream.el9.src.rpm
openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el9.src.rpm
openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el9.src.rpm
openvswitch3.1-3.1.0-32.el9fdp.src.rpm
ovn23.06-23.06.0-13.el9fdp.src.rpm

aarch64:
bpftool-7.0.0-284.23.1.el9_2.aarch64.rpm
bpftool-debuginfo-7.0.0-284.23.1.el9_2.aarch64.rpm
cri-o-1.26.3-11.rhaos4.13.git78941bf.el9.aarch64.rpm
cri-o-debuginfo-1.26.3-11.rhaos4.13.git78941bf.el9.aarch64.rpm
cri-o-debugsource-1.26.3-11.rhaos4.13.git78941bf.el9.aarch64.rpm
kernel-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-core-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-debug-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-debug-core-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-debug-debuginfo-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-debug-devel-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-debug-devel-matched-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-core-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-extra-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-internal-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-partner-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-debuginfo-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-devel-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-devel-matched-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-modules-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-modules-core-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-modules-extra-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-modules-internal-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-64k-modules-partner-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-core-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-cross-headers-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-debug-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-debug-core-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-debug-debuginfo-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-debug-devel-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-debug-devel-matched-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-debug-modules-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-debug-modules-core-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-debug-modules-extra-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-debug-modules-internal-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-debug-modules-partner-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-debuginfo-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-debuginfo-common-aarch64-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-devel-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-devel-matched-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-headers-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-modules-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-modules-core-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-modules-extra-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-modules-internal-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-modules-partner-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-selftests-internal-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-tools-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-tools-debuginfo-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-tools-libs-5.14.0-284.23.1.el9_2.aarch64.rpm
kernel-tools-libs-devel-5.14.0-284.23.1.el9_2.aarch64.rpm
openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el9.aarch64.rpm
openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el9.aarch64.rpm
openvswitch3.1-3.1.0-32.el9fdp.aarch64.rpm
openvswitch3.1-debuginfo-3.1.0-32.el9fdp.aarch64.rpm
openvswitch3.1-debugsource-3.1.0-32.el9fdp.aarch64.rpm
openvswitch3.1-devel-3.1.0-32.el9fdp.aarch64.rpm
openvswitch3.1-ipsec-3.1.0-32.el9fdp.aarch64.rpm
ovn23.06-23.06.0-13.el9fdp.aarch64.rpm
ovn23.06-central-23.06.0-13.el9fdp.aarch64.rpm
ovn23.06-central-debuginfo-23.06.0-13.el9fdp.aarch64.rpm
ovn23.06-debuginfo-23.06.0-13.el9fdp.aarch64.rpm
ovn23.06-debugsource-23.06.0-13.el9fdp.aarch64.rpm
ovn23.06-host-23.06.0-13.el9fdp.aarch64.rpm
ovn23.06-host-debuginfo-23.06.0-13.el9fdp.aarch64.rpm
ovn23.06-vtep-23.06.0-13.el9fdp.aarch64.rpm
ovn23.06-vtep-debuginfo-23.06.0-13.el9fdp.aarch64.rpm
perf-5.14.0-284.23.1.el9_2.aarch64.rpm
perf-debuginfo-5.14.0-284.23.1.el9_2.aarch64.rpm
python3-openvswitch3.1-3.1.0-32.el9fdp.aarch64.rpm
python3-openvswitch3.1-debuginfo-3.1.0-32.el9fdp.aarch64.rpm
python3-perf-5.14.0-284.23.1.el9_2.aarch64.rpm
python3-perf-debuginfo-5.14.0-284.23.1.el9_2.aarch64.rpm
rtla-5.14.0-284.23.1.el9_2.aarch64.rpm

noarch:
kernel-abi-stablelists-5.14.0-284.23.1.el9_2.noarch.rpm
kernel-doc-5.14.0-284.23.1.el9_2.noarch.rpm
openshift-ansible-4.13.0-202306230038.p0.g148be47.assembly.stream.el9.noarch.rpm
openshift-ansible-test-4.13.0-202306230038.p0.g148be47.assembly.stream.el9.noarch.rpm
openvswitch3.1-test-3.1.0-32.el9fdp.noarch.rpm

ppc64le:
bpftool-7.0.0-284.23.1.el9_2.ppc64le.rpm
bpftool-debuginfo-7.0.0-284.23.1.el9_2.ppc64le.rpm
cri-o-1.26.3-11.rhaos4.13.git78941bf.el9.ppc64le.rpm
cri-o-debuginfo-1.26.3-11.rhaos4.13.git78941bf.el9.ppc64le.rpm
cri-o-debugsource-1.26.3-11.rhaos4.13.git78941bf.el9.ppc64le.rpm
kernel-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-core-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-cross-headers-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-debug-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-debug-core-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-debug-debuginfo-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-debug-devel-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-debug-devel-matched-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-debug-modules-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-debug-modules-core-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-debug-modules-extra-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-debug-modules-internal-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-debug-modules-partner-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-debuginfo-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-debuginfo-common-ppc64le-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-devel-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-devel-matched-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-headers-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-ipaclones-internal-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-modules-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-modules-core-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-modules-extra-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-modules-internal-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-modules-partner-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-selftests-internal-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-tools-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-tools-debuginfo-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-tools-libs-5.14.0-284.23.1.el9_2.ppc64le.rpm
kernel-tools-libs-devel-5.14.0-284.23.1.el9_2.ppc64le.rpm
openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el9.ppc64le.rpm
openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el9.ppc64le.rpm
openvswitch3.1-3.1.0-32.el9fdp.ppc64le.rpm
openvswitch3.1-debuginfo-3.1.0-32.el9fdp.ppc64le.rpm
openvswitch3.1-debugsource-3.1.0-32.el9fdp.ppc64le.rpm
openvswitch3.1-devel-3.1.0-32.el9fdp.ppc64le.rpm
openvswitch3.1-ipsec-3.1.0-32.el9fdp.ppc64le.rpm
ovn23.06-23.06.0-13.el9fdp.ppc64le.rpm
ovn23.06-central-23.06.0-13.el9fdp.ppc64le.rpm
ovn23.06-central-debuginfo-23.06.0-13.el9fdp.ppc64le.rpm
ovn23.06-debuginfo-23.06.0-13.el9fdp.ppc64le.rpm
ovn23.06-debugsource-23.06.0-13.el9fdp.ppc64le.rpm
ovn23.06-host-23.06.0-13.el9fdp.ppc64le.rpm
ovn23.06-host-debuginfo-23.06.0-13.el9fdp.ppc64le.rpm
ovn23.06-vtep-23.06.0-13.el9fdp.ppc64le.rpm
ovn23.06-vtep-debuginfo-23.06.0-13.el9fdp.ppc64le.rpm
perf-5.14.0-284.23.1.el9_2.ppc64le.rpm
perf-debuginfo-5.14.0-284.23.1.el9_2.ppc64le.rpm
python3-openvswitch3.1-3.1.0-32.el9fdp.ppc64le.rpm
python3-openvswitch3.1-debuginfo-3.1.0-32.el9fdp.ppc64le.rpm
python3-perf-5.14.0-284.23.1.el9_2.ppc64le.rpm
python3-perf-debuginfo-5.14.0-284.23.1.el9_2.ppc64le.rpm
rtla-5.14.0-284.23.1.el9_2.ppc64le.rpm

s390x:
bpftool-7.0.0-284.23.1.el9_2.s390x.rpm
bpftool-debuginfo-7.0.0-284.23.1.el9_2.s390x.rpm
cri-o-1.26.3-11.rhaos4.13.git78941bf.el9.s390x.rpm
cri-o-debuginfo-1.26.3-11.rhaos4.13.git78941bf.el9.s390x.rpm
cri-o-debugsource-1.26.3-11.rhaos4.13.git78941bf.el9.s390x.rpm
kernel-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-core-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-cross-headers-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-debug-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-debug-core-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-debug-debuginfo-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-debug-devel-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-debug-devel-matched-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-debug-modules-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-debug-modules-core-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-debug-modules-extra-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-debug-modules-internal-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-debug-modules-partner-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-debuginfo-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-debuginfo-common-s390x-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-devel-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-devel-matched-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-headers-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-modules-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-modules-core-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-modules-extra-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-modules-internal-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-modules-partner-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-selftests-internal-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-tools-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-tools-debuginfo-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-zfcpdump-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-zfcpdump-core-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-zfcpdump-debuginfo-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-zfcpdump-devel-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-zfcpdump-devel-matched-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-core-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-extra-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-internal-5.14.0-284.23.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-partner-5.14.0-284.23.1.el9_2.s390x.rpm
openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el9.s390x.rpm
openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el9.s390x.rpm
openvswitch3.1-3.1.0-32.el9fdp.s390x.rpm
openvswitch3.1-debuginfo-3.1.0-32.el9fdp.s390x.rpm
openvswitch3.1-debugsource-3.1.0-32.el9fdp.s390x.rpm
openvswitch3.1-devel-3.1.0-32.el9fdp.s390x.rpm
openvswitch3.1-ipsec-3.1.0-32.el9fdp.s390x.rpm
ovn23.06-23.06.0-13.el9fdp.s390x.rpm
ovn23.06-central-23.06.0-13.el9fdp.s390x.rpm
ovn23.06-central-debuginfo-23.06.0-13.el9fdp.s390x.rpm
ovn23.06-debuginfo-23.06.0-13.el9fdp.s390x.rpm
ovn23.06-debugsource-23.06.0-13.el9fdp.s390x.rpm
ovn23.06-host-23.06.0-13.el9fdp.s390x.rpm
ovn23.06-host-debuginfo-23.06.0-13.el9fdp.s390x.rpm
ovn23.06-vtep-23.06.0-13.el9fdp.s390x.rpm
ovn23.06-vtep-debuginfo-23.06.0-13.el9fdp.s390x.rpm
perf-5.14.0-284.23.1.el9_2.s390x.rpm
perf-debuginfo-5.14.0-284.23.1.el9_2.s390x.rpm
python3-openvswitch3.1-3.1.0-32.el9fdp.s390x.rpm
python3-openvswitch3.1-debuginfo-3.1.0-32.el9fdp.s390x.rpm
python3-perf-5.14.0-284.23.1.el9_2.s390x.rpm
python3-perf-debuginfo-5.14.0-284.23.1.el9_2.s390x.rpm
rtla-5.14.0-284.23.1.el9_2.s390x.rpm

x86_64:
bpftool-7.0.0-284.23.1.el9_2.x86_64.rpm
bpftool-debuginfo-7.0.0-284.23.1.el9_2.x86_64.rpm
cri-o-1.26.3-11.rhaos4.13.git78941bf.el9.x86_64.rpm
cri-o-debuginfo-1.26.3-11.rhaos4.13.git78941bf.el9.x86_64.rpm
cri-o-debugsource-1.26.3-11.rhaos4.13.git78941bf.el9.x86_64.rpm
kernel-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-core-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-cross-headers-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-debug-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-debug-core-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-debug-debuginfo-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-debug-devel-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-debug-devel-matched-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-debug-modules-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-debug-modules-core-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-debug-modules-extra-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-debug-modules-internal-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-debug-modules-partner-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-debug-uki-virt-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-debuginfo-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-debuginfo-common-x86_64-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-devel-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-devel-matched-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-headers-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-ipaclones-internal-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-modules-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-modules-core-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-modules-extra-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-modules-internal-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-modules-partner-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-rt-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-core-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-debug-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-debug-core-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-debug-debuginfo-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-debug-devel-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-debug-devel-matched-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-debug-kvm-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-debug-modules-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-debug-modules-core-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-debug-modules-extra-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-debug-modules-internal-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-debug-modules-partner-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-debuginfo-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-devel-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-devel-matched-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-kvm-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-modules-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-modules-core-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-modules-extra-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-modules-internal-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-modules-partner-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-rt-selftests-internal-5.14.0-284.23.1.rt14.308.el9_2.x86_64.rpm
kernel-selftests-internal-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-tools-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-tools-debuginfo-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-tools-libs-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-tools-libs-devel-5.14.0-284.23.1.el9_2.x86_64.rpm
kernel-uki-virt-5.14.0-284.23.1.el9_2.x86_64.rpm
openshift-clients-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el9.x86_64.rpm
openshift-clients-redistributable-4.13.0-202306230038.p0.ge4c9a6a.assembly.stream.el9.x86_64.rpm
openshift-hyperkube-4.13.0-202307132344.p0.gf245ced.assembly.stream.el9.x86_64.rpm
openvswitch3.1-3.1.0-32.el9fdp.x86_64.rpm
openvswitch3.1-debuginfo-3.1.0-32.el9fdp.x86_64.rpm
openvswitch3.1-debugsource-3.1.0-32.el9fdp.x86_64.rpm
openvswitch3.1-devel-3.1.0-32.el9fdp.x86_64.rpm
openvswitch3.1-ipsec-3.1.0-32.el9fdp.x86_64.rpm
ovn23.06-23.06.0-13.el9fdp.x86_64.rpm
ovn23.06-central-23.06.0-13.el9fdp.x86_64.rpm
ovn23.06-central-debuginfo-23.06.0-13.el9fdp.x86_64.rpm
ovn23.06-debuginfo-23.06.0-13.el9fdp.x86_64.rpm
ovn23.06-debugsource-23.06.0-13.el9fdp.x86_64.rpm
ovn23.06-host-23.06.0-13.el9fdp.x86_64.rpm
ovn23.06-host-debuginfo-23.06.0-13.el9fdp.x86_64.rpm
ovn23.06-vtep-23.06.0-13.el9fdp.x86_64.rpm
ovn23.06-vtep-debuginfo-23.06.0-13.el9fdp.x86_64.rpm
perf-5.14.0-284.23.1.el9_2.x86_64.rpm
perf-debuginfo-5.14.0-284.23.1.el9_2.x86_64.rpm
python3-openvswitch3.1-3.1.0-32.el9fdp.x86_64.rpm
python3-openvswitch3.1-debuginfo-3.1.0-32.el9fdp.x86_64.rpm
python3-perf-5.14.0-284.23.1.el9_2.x86_64.rpm
python3-perf-debuginfo-5.14.0-284.23.1.el9_2.x86_64.rpm
rtla-5.14.0-284.23.1.el9_2.x86_64.rpm

Ironic content for Red Hat OpenShift Container Platform 4.13:

Source:
openstack-ironic-21.3.1-0.20230706125653.c8f8157.el9.src.rpm

noarch:
openstack-ironic-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm
openstack-ironic-api-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm
openstack-ironic-common-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm
openstack-ironic-conductor-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm
openstack-ironic-dnsmasq-tftp-server-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm
python3-ironic-tests-21.3.1-0.20230706125653.c8f8157.el9.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2023-1260
https://access.redhat.com/security/cve/CVE-2023-3089
https://access.redhat.com/security/cve/CVE-2023-24534
https://access.redhat.com/security/cve/CVE-2023-24536
https://access.redhat.com/security/cve/CVE-2023-24537
https://access.redhat.com/security/cve/CVE-2023-24538
https://access.redhat.com/security/cve/CVE-2023-24539
https://access.redhat.com/security/cve/CVE-2023-27561
https://access.redhat.com/security/cve/CVE-2023-29400
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/security/vulnerabilities/RHSB-2023-001
https://docs.openshift.com/container-platform/4.13/release_notes/ocp-4-13-release-notes.html

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=wjh5
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

Gentoo Linux Security Advisory 202408-07

Gentoo Linux Security Advisory 202408-7 - Multiple vulnerabilities have been discovered in Go, the worst of which could lead to information leakage or a denial of service. Versions greater than or equal to 1.22.3 are affected.

Ubuntu Security Notice USN-6038-2

Ubuntu Security Notice 6038-2 - USN-6038-1 fixed several vulnerabilities in Go 1.18. This update provides the corresponding updates for Go 1.13 and Go 1.16. CVE-2022-29526 and CVE-2022-30630 only affected Go 1.16. It was discovered that the Go net/http module incorrectly handled Transfer-Encoding headers in the HTTP/1 client. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack.

Red Hat Security Advisory 2023-5964-01

Red Hat Security Advisory 2023-5964-01 - An update for collectd-libpod-stats is now available for Red Hat OpenStack Platform 16.2.5. Issues addressed include a denial of service vulnerability.

RHSA-2023:5442: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.2 security and bug fix updates

Red Hat Advanced Cluster Management for Kubernetes 2.8.2 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41721: A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead read the body of the HTTP request, which could be att...

GHSA-92hx-3mh6-hc49: kube-apiserver authentication bypass vulnerability

An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.

CVE-2023-1260: cve-details

An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "pods/ephemeralcontainers" subresource beyond what the default is. They would then need to create a new pod or patch one that they already have access to. This might allow evasion of SCC admission restrictions, thereby gaining control of a privileged pod.

Red Hat Security Advisory 2023-5103-01

Red Hat Security Advisory 2023-5103-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.11.6 images.

RHSA-2023:4986: Red Hat Security Advisory: Red Hat OpenShift Distributed Tracing 2.9.0 security update

Updated Red Hat OpenShift Distributed Tracing 2.9 container images are now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial...

Red Hat Security Advisory 2023-4862-01

Red Hat Security Advisory 2023-4862-01 - Multicluster Engine for Kubernetes 2.3.1 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a bypass vulnerability.

RHSA-2023:4657: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.2 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.1.2 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24532: A flaw was found in the crypto/internal/nistec golang library. The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars, such as a scalar larger than the order of the curve. This does not impact usages of crypto/ecdsa or crypto/ecdh. * CVE-2023-24534: A flaw was found in Golang Go...

Red Hat Security Advisory 2023-4664-01

Red Hat Security Advisory 2023-4664-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.3 images. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4654-01

Red Hat Security Advisory 2023-4654-01 - Red Hat Advanced Cluster Management for Kubernetes 2.7.7 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

Red Hat Security Advisory 2023-4627-01

Red Hat Security Advisory 2023-4627-01 - Migration Toolkit for Applications 6.2.0 Images. Issues addressed include a denial of service vulnerability.

RHSA-2023:4456: Red Hat Security Advisory: OpenShift Container Platform 4.13.8 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.8 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

RHSA-2023:4335: Red Hat Security Advisory: Security Update for cert-manager Operator for Red Hat OpenShift 1.10.3

cert-manager Operator for Red Hat OpenShift 1.10.3 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specia...

RHSA-2023:4475: Red Hat Security Advisory: Gatekeeper Operator v0.2 security fixes and enhancements

Gatekeeper Operator v0.2 security fixes and enhancements Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-4312-01

Red Hat Security Advisory 2023-4312-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.46.

RHSA-2023:4312: Red Hat Security Advisory: OpenShift Container Platform 4.11.46 security update

Red Hat OpenShift Container Platform release 4.11.46 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1260: An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "p...

Red Hat Security Advisory 2023-4226-01

Red Hat Security Advisory 2023-4226-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.6.

Red Hat Security Advisory 2023-4225-01

Red Hat Security Advisory 2023-4225-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.6.

Red Hat Security Advisory 2023-4290-01

Red Hat Security Advisory 2023-4290-01 - OpenShift sandboxed containers 1.4.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-4293-01

Red Hat Security Advisory 2023-4293-01 - The Migration Toolkit for Containers (MTC) 1.7.11 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate.

RHSA-2023:4226: Red Hat Security Advisory: OpenShift Container Platform 4.13.6 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.6 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...

RHSA-2023:4225: Red Hat Security Advisory: OpenShift Container Platform 4.13.6 security and extras update

Red Hat OpenShift Container Platform release 4.13.6 is now available with updates to packages and images that fix several bugs. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.

Red Hat Security Advisory 2023-4276-01

Red Hat Security Advisory 2023-4276-01 - An update is now available for Red Hat DevWorkspace Operator. Red Hat Product Security has rated this update as having a security impact of Moderate.

Red Hat Security Advisory 2023-4241-01

Red Hat Security Advisory 2023-4241-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.

Red Hat Security Advisory 2023-4091-01

Red Hat Security Advisory 2023-4091-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.5. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4090-01

Red Hat Security Advisory 2023-4090-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.5.

RHSA-2023:4093: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1260: An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "po...

RHSA-2023:4093: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1260: An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "po...

RHSA-2023:4093: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1260: An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "po...

RHSA-2023:4093: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1260: An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "po...

RHSA-2023:4091: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...

RHSA-2023:4091: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...

RHSA-2023:4091: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...

RHSA-2023:4090: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...

RHSA-2023:4241: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.10.14 security and bug fix update

Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.10.14 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

RHSA-2023:4238: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.9 security and bug fix update

Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.11.9 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

Red Hat Security Advisory 2023-3976-01

Red Hat Security Advisory 2023-3976-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.24.

RHSA-2023:3976: Red Hat Security Advisory: OpenShift Container Platform 4.12.24 packages and security update

Red Hat OpenShift Container Platform release 4.12.24 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1260: An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "po...

Red Hat Security Advisory 2023-4003-01

Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4003-01

Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4003-01

Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4003-01

Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4003-01

Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-4003-01

Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3924-01

Red Hat Security Advisory 2023-3924-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.23.

RHSA-2023:3925: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-...

RHSA-2023:3925: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-...

Red Hat Security Advisory 2023-3914-01

Red Hat Security Advisory 2023-3914-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.44.

Red Hat Security Advisory 2023-3911-01

Red Hat Security Advisory 2023-3911-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.63.

RHSA-2023:3915: Red Hat Security Advisory: OpenShift Container Platform 4.11.44 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS...

RHSA-2023:3918: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.5 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.5 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in H...

RHSA-2023:3918: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.5 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.5 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in H...

RHSA-2023:3918: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.5 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.5 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in H...

RHSA-2023:3918: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.5 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.5 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in H...

RHSA-2023:3918: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.5 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.5 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in H...

RHSA-2023:3918: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.5 security and bug fix update

OpenShift API for Data Protection (OADP) 1.1.5 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in H...

RHSA-2023:3905: Red Hat Security Advisory: Network observability 1.3.0 for Openshift

Network Observability 1.3.0 for OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted input. * CVE-2023-24540: A flaw was found in golang,...

RHSA-2023:3905: Red Hat Security Advisory: Network observability 1.3.0 for Openshift

Network Observability 1.3.0 for OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted input. * CVE-2023-24540: A flaw was found in golang,...

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3612-01

Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.

CVE-2023-32463: DSA-2023-200: Security Update for Dell VxRail for Multiple Third-Party Component Vulnerabilities

Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.

CVE-2023-32463: DSA-2023-200: Security Update for Dell VxRail for Multiple Third-Party Component Vulnerabilities

Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.

Red Hat Security Advisory 2023-3624-01

Red Hat Security Advisory 2023-3624-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3624-01

Red Hat Security Advisory 2023-3624-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3624-01

Red Hat Security Advisory 2023-3624-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3624-01

Red Hat Security Advisory 2023-3624-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3540-01

Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3540-01

Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3540-01

Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3540-01

Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3540-01

Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.

RHSA-2023:3624: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.10 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...

RHSA-2023:3624: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.10 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...

RHSA-2023:3624: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.10 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...

RHSA-2023:3624: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.10 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...

RHSA-2023:3540: Red Hat Security Advisory: OpenShift Container Platform 4.13.3 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A ...

RHSA-2023:3540: Red Hat Security Advisory: OpenShift Container Platform 4.13.3 bug fix and security update

Red Hat OpenShift Container Platform release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A ...

RHSA-2023:3455: Red Hat Security Advisory: Release of OpenShift Serverless 1.29.0

OpenShift Serverless version 1.29.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker ...

RHSA-2023:3455: Red Hat Security Advisory: Release of OpenShift Serverless 1.29.0

OpenShift Serverless version 1.29.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker ...

RHSA-2023:3455: Red Hat Security Advisory: Release of OpenShift Serverless 1.29.0

OpenShift Serverless version 1.29.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker ...

RHSA-2023:3455: Red Hat Security Advisory: Release of OpenShift Serverless 1.29.0

OpenShift Serverless version 1.29.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker ...

RHSA-2023:3445: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...

RHSA-2023:3445: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...

RHSA-2023:3450: Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release

OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...

RHSA-2023:3450: Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release

OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...

RHSA-2023:3450: Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release

OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...

RHSA-2023:3450: Red Hat Security Advisory: OpenShift Serverless Client kn 1.29.0 release

OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...

RHSA-2023:3435: Red Hat Security Advisory: Red Hat Advanced Cluster Security 3.74 for Kubernetes security update

An update is now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted inpu...

RHSA-2023:3435: Red Hat Security Advisory: Red Hat Advanced Cluster Security 3.74 for Kubernetes security update

An update is now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted inpu...

Red Hat Security Advisory 2023-3415-01

Red Hat Security Advisory 2023-3415-01 - Updated images are now available for Red Hat Advanced Cluster Security (RHACS). The updated image includes security and bug fixes.

Red Hat Security Advisory 2023-3415-01

Red Hat Security Advisory 2023-3415-01 - Updated images are now available for Red Hat Advanced Cluster Security (RHACS). The updated image includes security and bug fixes.

Red Hat Security Advisory 2023-3323-01

Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Red Hat Security Advisory 2023-3323-01

Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Red Hat Security Advisory 2023-3323-01

Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Red Hat Security Advisory 2023-3323-01

Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Red Hat Security Advisory 2023-3167-01

Red Hat Security Advisory 2023-3167-01 - New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images have been released, adding a variety of features and bug fixes. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3167-01

Red Hat Security Advisory 2023-3167-01 - New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images have been released, adding a variety of features and bug fixes. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-3167-01

Red Hat Security Advisory 2023-3167-01 - New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images have been released, adding a variety of features and bug fixes. Issues addressed include a denial of service vulnerability.

Ubuntu Security Notice USN-6088-1

Ubuntu Security Notice 6088-1 - It was discovered that runC incorrectly made /sys/fs/cgroup writable when in rootless mode. An attacker could possibly use this issue to escalate privileges. It was discovered that runC incorrectly performed access control when mounting /proc to non-directories. An attacker could possibly use this issue to escalate privileges. It was discovered that runC incorrectly handled /proc and /sys mounts inside a container. An attacker could possibly use this issue to bypass AppArmor, and potentially SELinux.

Red Hat Security Advisory 2023-1326-01

Red Hat Security Advisory 2023-1326-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, information leakage, out of bounds read, and remote SQL injection vulnerabilities.

Red Hat Security Advisory 2023-1326-01

Red Hat Security Advisory 2023-1326-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, information leakage, out of bounds read, and remote SQL injection vulnerabilities.

RHSA-2023:3167: Red Hat Security Advisory: Red Hat build of Cryostat 2.3.0: new RHEL 8 container images

New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images are now availableThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

RHSA-2023:1326: Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update

Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...

CVE-2023-24540: [security] Go 1.20.4 and Go 1.19.9 are released

Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

CVE-2023-24540: [security] Go 1.20.4 and Go 1.19.9 are released

Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

CVE-2023-24534: net/http, net/textproto: denial of service from excessive memory allocation ​(CVE-2023-24534) · Issue #58975 · golang/go

HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. With fix, header parsing now correctly allocates only the memory required to hold parsed headers.

CVE-2023-24538

Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinte...

CVE-2023-24537

Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow.

CVE-2023-28642: AppArmor/SELinux bypass with symlinked /proc

runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.

CVE-2023-27561: CVE-2019-19921 re-introduction/regression · Issue #3751 · opencontainers/runc

runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.

CVE-2019-19921: [CVE-2019-19921]: Volume mount race condition with shared mounts · Issue #2197 · opencontainers/runc

runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)

Packet Storm: Latest News

Zeek 6.0.9