Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2024-8113-03

Red Hat Security Advisory 2024-8113-03 - Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.16.3 on Red Hat Enterprise Linux 9 from Red Hat Container Registry.

Packet Storm
#web#linux#red_hat#js
The following advisory data is extracted from:https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8113.jsonRed Hat officially shut down their mailing list notifications October 10, 2023.  Due to this, Packet Storm has recreated the below data as a reference point to raise awareness.  It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment.- Packet Storm Staff====================================================================Red Hat Security AdvisorySynopsis:           Important: Red Hat OpenShift Data Foundation 4.16.3 security and bug fix updateAdvisory ID:        RHSA-2024:8113-03Product:            Red Hat OpenShift Data FoundationAdvisory URL:       https://access.redhat.com/errata/RHSA-2024:8113Issue date:         2024-10-15Revision:           03CVE Names:          CVE-2024-43788====================================================================Summary: Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.16.3 on Red Hat Enterprise Linux 9 from Red Hat Container Registry.Description:Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multi-cloud data management service with anS3 compatible API.Bug fixes:* Previously, on the disaster recover (DR) monitoring dashboard, the detail about `Last snapshot synced` was missing for appset based applications. With this fix, the dashboard shows the `lastGroupSyncTime` under the `Volume snapshot` for the selected appset based applications. (BZ#2295324)* Previously, when OpenShift Data Foundation was installed in a namespace other than `openshift-storage`, such as ROSA, the user interface (UI) labelled the nodes during the StorageSystem deployment and added a dynamic label \"cluster.ocs.openshift.io/<CLUSTER_NAMESPACE>: ‘'\", where \"CLUSTER_NAMESPACE\" is the namespace in which the StorageSystem is getting created). However the ODF/OCS operators expected the label to be always a static label, \"cluster.ocs.openshift.io/openshift-storage: ‘’.With this fix, the user interface adds a static label \"cluster.ocs.openshift.io/openshift-storage: ‘’ to the nodes and as a result the installation proceeds as expected. (BZ#2303083)Enhancement:* In the storage clients table of the Storage clients page of the OpenShift web console, storage cluster name is displayed along with the cluster ID to provide better clarity. (BZ#2304905)All users of Red Hat OpenShift Data Foundation are advised to upgrade to these updated images, which provide these bug fixes.Solution:https://access.redhat.com/articles/11258CVEs:CVE-2024-43788References:https://access.redhat.com/security/updates/classification/#importanthttps://bugzilla.redhat.com/show_bug.cgi?id=2283959https://bugzilla.redhat.com/show_bug.cgi?id=2295324https://bugzilla.redhat.com/show_bug.cgi?id=2296521https://bugzilla.redhat.com/show_bug.cgi?id=2300333https://bugzilla.redhat.com/show_bug.cgi?id=2302463https://bugzilla.redhat.com/show_bug.cgi?id=2303083https://bugzilla.redhat.com/show_bug.cgi?id=2304905https://bugzilla.redhat.com/show_bug.cgi?id=2308445https://bugzilla.redhat.com/show_bug.cgi?id=2310370https://bugzilla.redhat.com/show_bug.cgi?id=2312055https://bugzilla.redhat.com/show_bug.cgi?id=2315708

Related news

Red Hat Security Advisory 2024-8014-03

Red Hat Security Advisory 2024-8014-03 - Network Observability 1.7 for Red Hat OpenShift. Issues addressed include code execution, cross site scripting, and denial of service vulnerabilities.

Red Hat Security Advisory 2024-7726-03

Red Hat Security Advisory 2024-7726-03 - Red Hat OpenShift Service Mesh Containers for 2.6.2. Issues addressed include code execution and denial of service vulnerabilities.

Red Hat Security Advisory 2024-7725-03

Red Hat Security Advisory 2024-7725-03 - Red Hat OpenShift Service Mesh Containers for 2.5.5. Issues addressed include code execution and denial of service vulnerabilities.

Red Hat Security Advisory 2024-7724-03

Red Hat Security Advisory 2024-7724-03 - Red Hat OpenShift Service Mesh Containers for 2.4.11. Issues addressed include a code execution vulnerability.

Red Hat Security Advisory 2024-7706-03

Red Hat Security Advisory 2024-7706-03 - An update is now available for the Red Hat build of Cryostat 3 on RHEL 8. Issues addressed include a cross site scripting vulnerability.

GHSA-4vvj-4cpr-p986: Webpack's AutoPublicPathRuntimeModule has a DOM Clobbering Gadget that leads to XSS

Hi, Webpack developer team! ### Summary We discovered a DOM Clobbering vulnerability in Webpack’s `AutoPublicPathRuntimeModule`. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an `img` tag with an unsanitized `name` attribute) are present. We found the real-world exploitation of this gadget in the Canvas LMS which allows XSS attack happens through an javascript code compiled by Webpack (the vulnerable part is from Webpack). We believe this is a severe issue. If Webpack’s code is not resilient to DOM Clobbering attacks, it could lead to significant security vulnerabilities in any web application using Webpack-compiled code. ### Details #### Backgrounds DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) livin...

Packet Storm: Latest News

Ivanti EPM Agent Portal Command Execution