Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2023-0727-01

Red Hat Security Advisory 2023-0727-01 - Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.3.

Packet Storm
#vulnerability#web#linux#red_hat#redis#js#git#kubernetes#rpm#docker

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: OpenShift Container Platform 4.12.3 security update
Advisory ID: RHSA-2023:0727-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2023:0727
Issue date: 2023-02-16
CVE Names: CVE-2022-2879 CVE-2022-2880 CVE-2022-41715
=====================================================================

  1. Summary:

Red Hat OpenShift Container Platform release 4.12.3 is now available with
updates to packages and images that fix several bugs and add enhancements.

This release includes a security update for Red Hat OpenShift Container
Platform 4.12.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat OpenShift Container Platform 4.12 - aarch64, noarch, ppc64le, s390x, x86_64

  1. Description:

Red Hat OpenShift Container Platform is Red Hat’s cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.12.3. See the following advisory for the container images for
this release:

https://access.redhat.com/errata/RHSA-2023:0728

Security Fix(es):

  • golang: archive/tar: unbounded memory consumption when reading headers
    (CVE-2022-2879)

  • golang: net/http/httputil: ReverseProxy should not forward unparseable
    query parameters (CVE-2022-2880)

  • golang: regexp/syntax: limit memory used by parsing regexps
    (CVE-2022-41715)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

All OpenShift Container Platform 4.12 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift CLI (oc)
or web console. Instructions for upgrading a cluster are available at
https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html

  1. Solution:

For OpenShift Container Platform 4.12 see the following documentation,
which will be updated shortly for this release, for important instructions
on how to upgrade your cluster and fully apply this asynchronous errata
update:

https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html

The system must be rebooted for this update to take effect.

  1. Bugs fixed (https://bugzilla.redhat.com/):

2132867 - CVE-2022-2879 golang: archive/tar: unbounded memory consumption when reading headers
2132868 - CVE-2022-2880 golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters
2132872 - CVE-2022-41715 golang: regexp/syntax: limit memory used by parsing regexps

  1. Package List:

Red Hat OpenShift Container Platform 4.12:

Source:
buildah-1.23.4-4.rhaos4.12.el8.src.rpm
conmon-2.1.2-3.rhaos4.12.el8.src.rpm
container-selinux-2.188.0-2.rhaos4.12.el8.src.rpm
containernetworking-plugins-1.0.1-6.rhaos4.12.el8.src.rpm
containers-common-1-33.rhaos4.12.el8.src.rpm
cri-o-1.25.2-6.rhaos4.12.git3c4e50c.el8.src.rpm
crun-1.4.2-2.rhaos4.12.el8.src.rpm
fuse-overlayfs-1.9-2.rhaos4.12.el8.src.rpm
haproxy-2.2.24-2.el8.src.rpm
kernel-rt-4.18.0-372.43.1.rt7.200.el8_6.src.rpm
openshift-clients-4.12.0-202301312133.p0.gb05f7d4.assembly.stream.el8.src.rpm
runc-1.1.4-2.rhaos4.12.el8.src.rpm
skopeo-1.9.4-2.rhaos4.12.el8.src.rpm
slirp4netns-1.1.8-2.rhaos4.12.el8.src.rpm
toolbox-0.1.1-3.rhaos4.12.el8.src.rpm

aarch64:
buildah-1.23.4-4.rhaos4.12.el8.aarch64.rpm
buildah-debuginfo-1.23.4-4.rhaos4.12.el8.aarch64.rpm
buildah-debugsource-1.23.4-4.rhaos4.12.el8.aarch64.rpm
buildah-tests-1.23.4-4.rhaos4.12.el8.aarch64.rpm
buildah-tests-debuginfo-1.23.4-4.rhaos4.12.el8.aarch64.rpm
conmon-2.1.2-3.rhaos4.12.el8.aarch64.rpm
conmon-debuginfo-2.1.2-3.rhaos4.12.el8.aarch64.rpm
conmon-debugsource-2.1.2-3.rhaos4.12.el8.aarch64.rpm
containernetworking-plugins-1.0.1-6.rhaos4.12.el8.aarch64.rpm
containernetworking-plugins-debuginfo-1.0.1-6.rhaos4.12.el8.aarch64.rpm
containernetworking-plugins-debugsource-1.0.1-6.rhaos4.12.el8.aarch64.rpm
containers-common-1-33.rhaos4.12.el8.aarch64.rpm
cri-o-1.25.2-6.rhaos4.12.git3c4e50c.el8.aarch64.rpm
cri-o-debuginfo-1.25.2-6.rhaos4.12.git3c4e50c.el8.aarch64.rpm
cri-o-debugsource-1.25.2-6.rhaos4.12.git3c4e50c.el8.aarch64.rpm
crun-1.4.2-2.rhaos4.12.el8.aarch64.rpm
crun-debuginfo-1.4.2-2.rhaos4.12.el8.aarch64.rpm
crun-debugsource-1.4.2-2.rhaos4.12.el8.aarch64.rpm
fuse-overlayfs-1.9-2.rhaos4.12.el8.aarch64.rpm
fuse-overlayfs-debuginfo-1.9-2.rhaos4.12.el8.aarch64.rpm
fuse-overlayfs-debugsource-1.9-2.rhaos4.12.el8.aarch64.rpm
haproxy-debugsource-2.2.24-2.el8.aarch64.rpm
haproxy22-2.2.24-2.el8.aarch64.rpm
haproxy22-debuginfo-2.2.24-2.el8.aarch64.rpm
openshift-clients-4.12.0-202301312133.p0.gb05f7d4.assembly.stream.el8.aarch64.rpm
runc-1.1.4-2.rhaos4.12.el8.aarch64.rpm
runc-debuginfo-1.1.4-2.rhaos4.12.el8.aarch64.rpm
runc-debugsource-1.1.4-2.rhaos4.12.el8.aarch64.rpm
skopeo-1.9.4-2.rhaos4.12.el8.aarch64.rpm
skopeo-debuginfo-1.9.4-2.rhaos4.12.el8.aarch64.rpm
skopeo-debugsource-1.9.4-2.rhaos4.12.el8.aarch64.rpm
skopeo-tests-1.9.4-2.rhaos4.12.el8.aarch64.rpm
slirp4netns-1.1.8-2.rhaos4.12.el8.aarch64.rpm
slirp4netns-debuginfo-1.1.8-2.rhaos4.12.el8.aarch64.rpm
slirp4netns-debugsource-1.1.8-2.rhaos4.12.el8.aarch64.rpm

noarch:
container-selinux-2.188.0-2.rhaos4.12.el8.noarch.rpm
toolbox-0.1.1-3.rhaos4.12.el8.noarch.rpm

ppc64le:
buildah-1.23.4-4.rhaos4.12.el8.ppc64le.rpm
buildah-debuginfo-1.23.4-4.rhaos4.12.el8.ppc64le.rpm
buildah-debugsource-1.23.4-4.rhaos4.12.el8.ppc64le.rpm
buildah-tests-1.23.4-4.rhaos4.12.el8.ppc64le.rpm
buildah-tests-debuginfo-1.23.4-4.rhaos4.12.el8.ppc64le.rpm
conmon-2.1.2-3.rhaos4.12.el8.ppc64le.rpm
conmon-debuginfo-2.1.2-3.rhaos4.12.el8.ppc64le.rpm
conmon-debugsource-2.1.2-3.rhaos4.12.el8.ppc64le.rpm
containernetworking-plugins-1.0.1-6.rhaos4.12.el8.ppc64le.rpm
containernetworking-plugins-debuginfo-1.0.1-6.rhaos4.12.el8.ppc64le.rpm
containernetworking-plugins-debugsource-1.0.1-6.rhaos4.12.el8.ppc64le.rpm
containers-common-1-33.rhaos4.12.el8.ppc64le.rpm
cri-o-1.25.2-6.rhaos4.12.git3c4e50c.el8.ppc64le.rpm
cri-o-debuginfo-1.25.2-6.rhaos4.12.git3c4e50c.el8.ppc64le.rpm
cri-o-debugsource-1.25.2-6.rhaos4.12.git3c4e50c.el8.ppc64le.rpm
crun-1.4.2-2.rhaos4.12.el8.ppc64le.rpm
crun-debuginfo-1.4.2-2.rhaos4.12.el8.ppc64le.rpm
crun-debugsource-1.4.2-2.rhaos4.12.el8.ppc64le.rpm
fuse-overlayfs-1.9-2.rhaos4.12.el8.ppc64le.rpm
fuse-overlayfs-debuginfo-1.9-2.rhaos4.12.el8.ppc64le.rpm
fuse-overlayfs-debugsource-1.9-2.rhaos4.12.el8.ppc64le.rpm
haproxy-debugsource-2.2.24-2.el8.ppc64le.rpm
haproxy22-2.2.24-2.el8.ppc64le.rpm
haproxy22-debuginfo-2.2.24-2.el8.ppc64le.rpm
openshift-clients-4.12.0-202301312133.p0.gb05f7d4.assembly.stream.el8.ppc64le.rpm
runc-1.1.4-2.rhaos4.12.el8.ppc64le.rpm
runc-debuginfo-1.1.4-2.rhaos4.12.el8.ppc64le.rpm
runc-debugsource-1.1.4-2.rhaos4.12.el8.ppc64le.rpm
skopeo-1.9.4-2.rhaos4.12.el8.ppc64le.rpm
skopeo-debuginfo-1.9.4-2.rhaos4.12.el8.ppc64le.rpm
skopeo-debugsource-1.9.4-2.rhaos4.12.el8.ppc64le.rpm
skopeo-tests-1.9.4-2.rhaos4.12.el8.ppc64le.rpm
slirp4netns-1.1.8-2.rhaos4.12.el8.ppc64le.rpm
slirp4netns-debuginfo-1.1.8-2.rhaos4.12.el8.ppc64le.rpm
slirp4netns-debugsource-1.1.8-2.rhaos4.12.el8.ppc64le.rpm

s390x:
buildah-1.23.4-4.rhaos4.12.el8.s390x.rpm
buildah-debuginfo-1.23.4-4.rhaos4.12.el8.s390x.rpm
buildah-debugsource-1.23.4-4.rhaos4.12.el8.s390x.rpm
buildah-tests-1.23.4-4.rhaos4.12.el8.s390x.rpm
buildah-tests-debuginfo-1.23.4-4.rhaos4.12.el8.s390x.rpm
conmon-2.1.2-3.rhaos4.12.el8.s390x.rpm
conmon-debuginfo-2.1.2-3.rhaos4.12.el8.s390x.rpm
conmon-debugsource-2.1.2-3.rhaos4.12.el8.s390x.rpm
containernetworking-plugins-1.0.1-6.rhaos4.12.el8.s390x.rpm
containernetworking-plugins-debuginfo-1.0.1-6.rhaos4.12.el8.s390x.rpm
containernetworking-plugins-debugsource-1.0.1-6.rhaos4.12.el8.s390x.rpm
containers-common-1-33.rhaos4.12.el8.s390x.rpm
cri-o-1.25.2-6.rhaos4.12.git3c4e50c.el8.s390x.rpm
cri-o-debuginfo-1.25.2-6.rhaos4.12.git3c4e50c.el8.s390x.rpm
cri-o-debugsource-1.25.2-6.rhaos4.12.git3c4e50c.el8.s390x.rpm
crun-1.4.2-2.rhaos4.12.el8.s390x.rpm
crun-debuginfo-1.4.2-2.rhaos4.12.el8.s390x.rpm
crun-debugsource-1.4.2-2.rhaos4.12.el8.s390x.rpm
fuse-overlayfs-1.9-2.rhaos4.12.el8.s390x.rpm
fuse-overlayfs-debuginfo-1.9-2.rhaos4.12.el8.s390x.rpm
fuse-overlayfs-debugsource-1.9-2.rhaos4.12.el8.s390x.rpm
haproxy-debugsource-2.2.24-2.el8.s390x.rpm
haproxy22-2.2.24-2.el8.s390x.rpm
haproxy22-debuginfo-2.2.24-2.el8.s390x.rpm
openshift-clients-4.12.0-202301312133.p0.gb05f7d4.assembly.stream.el8.s390x.rpm
runc-1.1.4-2.rhaos4.12.el8.s390x.rpm
runc-debuginfo-1.1.4-2.rhaos4.12.el8.s390x.rpm
runc-debugsource-1.1.4-2.rhaos4.12.el8.s390x.rpm
skopeo-1.9.4-2.rhaos4.12.el8.s390x.rpm
skopeo-debuginfo-1.9.4-2.rhaos4.12.el8.s390x.rpm
skopeo-debugsource-1.9.4-2.rhaos4.12.el8.s390x.rpm
skopeo-tests-1.9.4-2.rhaos4.12.el8.s390x.rpm
slirp4netns-1.1.8-2.rhaos4.12.el8.s390x.rpm
slirp4netns-debuginfo-1.1.8-2.rhaos4.12.el8.s390x.rpm
slirp4netns-debugsource-1.1.8-2.rhaos4.12.el8.s390x.rpm

x86_64:
buildah-1.23.4-4.rhaos4.12.el8.x86_64.rpm
buildah-debuginfo-1.23.4-4.rhaos4.12.el8.x86_64.rpm
buildah-debugsource-1.23.4-4.rhaos4.12.el8.x86_64.rpm
buildah-tests-1.23.4-4.rhaos4.12.el8.x86_64.rpm
buildah-tests-debuginfo-1.23.4-4.rhaos4.12.el8.x86_64.rpm
conmon-2.1.2-3.rhaos4.12.el8.x86_64.rpm
conmon-debuginfo-2.1.2-3.rhaos4.12.el8.x86_64.rpm
conmon-debugsource-2.1.2-3.rhaos4.12.el8.x86_64.rpm
containernetworking-plugins-1.0.1-6.rhaos4.12.el8.x86_64.rpm
containernetworking-plugins-debuginfo-1.0.1-6.rhaos4.12.el8.x86_64.rpm
containernetworking-plugins-debugsource-1.0.1-6.rhaos4.12.el8.x86_64.rpm
containers-common-1-33.rhaos4.12.el8.x86_64.rpm
cri-o-1.25.2-6.rhaos4.12.git3c4e50c.el8.x86_64.rpm
cri-o-debuginfo-1.25.2-6.rhaos4.12.git3c4e50c.el8.x86_64.rpm
cri-o-debugsource-1.25.2-6.rhaos4.12.git3c4e50c.el8.x86_64.rpm
crun-1.4.2-2.rhaos4.12.el8.x86_64.rpm
crun-debuginfo-1.4.2-2.rhaos4.12.el8.x86_64.rpm
crun-debugsource-1.4.2-2.rhaos4.12.el8.x86_64.rpm
fuse-overlayfs-1.9-2.rhaos4.12.el8.x86_64.rpm
fuse-overlayfs-debuginfo-1.9-2.rhaos4.12.el8.x86_64.rpm
fuse-overlayfs-debugsource-1.9-2.rhaos4.12.el8.x86_64.rpm
haproxy-debugsource-2.2.24-2.el8.x86_64.rpm
haproxy22-2.2.24-2.el8.x86_64.rpm
haproxy22-debuginfo-2.2.24-2.el8.x86_64.rpm
kernel-rt-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-core-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-debug-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-debug-core-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-debug-debuginfo-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-debug-devel-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-debug-kvm-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-debug-modules-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-debug-modules-extra-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-debug-modules-internal-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-debuginfo-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-devel-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-kvm-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-modules-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-modules-extra-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-modules-internal-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
kernel-rt-selftests-internal-4.18.0-372.43.1.rt7.200.el8_6.x86_64.rpm
openshift-clients-4.12.0-202301312133.p0.gb05f7d4.assembly.stream.el8.x86_64.rpm
openshift-clients-redistributable-4.12.0-202301312133.p0.gb05f7d4.assembly.stream.el8.x86_64.rpm
runc-1.1.4-2.rhaos4.12.el8.x86_64.rpm
runc-debuginfo-1.1.4-2.rhaos4.12.el8.x86_64.rpm
runc-debugsource-1.1.4-2.rhaos4.12.el8.x86_64.rpm
skopeo-1.9.4-2.rhaos4.12.el8.x86_64.rpm
skopeo-debuginfo-1.9.4-2.rhaos4.12.el8.x86_64.rpm
skopeo-debugsource-1.9.4-2.rhaos4.12.el8.x86_64.rpm
skopeo-tests-1.9.4-2.rhaos4.12.el8.x86_64.rpm
slirp4netns-1.1.8-2.rhaos4.12.el8.x86_64.rpm
slirp4netns-debuginfo-1.1.8-2.rhaos4.12.el8.x86_64.rpm
slirp4netns-debugsource-1.1.8-2.rhaos4.12.el8.x86_64.rpm

Red Hat OpenShift Container Platform 4.12:

Source:
buildah-1.23.4-4.rhaos4.12.el9.src.rpm
conmon-2.1.2-4.rhaos4.12.el9.src.rpm
crun-1.4.2-3.rhaos4.12.el9.src.rpm
openshift-clients-4.12.0-202301312133.p0.gb05f7d4.assembly.stream.el9.src.rpm
podman-4.2.0-5.rhaos4.12.el9.src.rpm
skopeo-1.9.4-2.rhaos4.12.el9.src.rpm

aarch64:
buildah-1.23.4-4.rhaos4.12.el9.aarch64.rpm
buildah-debuginfo-1.23.4-4.rhaos4.12.el9.aarch64.rpm
buildah-debugsource-1.23.4-4.rhaos4.12.el9.aarch64.rpm
buildah-tests-1.23.4-4.rhaos4.12.el9.aarch64.rpm
buildah-tests-debuginfo-1.23.4-4.rhaos4.12.el9.aarch64.rpm
conmon-2.1.2-4.rhaos4.12.el9.aarch64.rpm
conmon-debuginfo-2.1.2-4.rhaos4.12.el9.aarch64.rpm
conmon-debugsource-2.1.2-4.rhaos4.12.el9.aarch64.rpm
crun-1.4.2-3.rhaos4.12.el9.aarch64.rpm
crun-debuginfo-1.4.2-3.rhaos4.12.el9.aarch64.rpm
crun-debugsource-1.4.2-3.rhaos4.12.el9.aarch64.rpm
openshift-clients-4.12.0-202301312133.p0.gb05f7d4.assembly.stream.el9.aarch64.rpm
podman-4.2.0-5.rhaos4.12.el9.aarch64.rpm
podman-catatonit-4.2.0-5.rhaos4.12.el9.aarch64.rpm
podman-catatonit-debuginfo-4.2.0-5.rhaos4.12.el9.aarch64.rpm
podman-debuginfo-4.2.0-5.rhaos4.12.el9.aarch64.rpm
podman-debugsource-4.2.0-5.rhaos4.12.el9.aarch64.rpm
podman-gvproxy-4.2.0-5.rhaos4.12.el9.aarch64.rpm
podman-gvproxy-debuginfo-4.2.0-5.rhaos4.12.el9.aarch64.rpm
podman-plugins-4.2.0-5.rhaos4.12.el9.aarch64.rpm
podman-plugins-debuginfo-4.2.0-5.rhaos4.12.el9.aarch64.rpm
podman-remote-4.2.0-5.rhaos4.12.el9.aarch64.rpm
podman-remote-debuginfo-4.2.0-5.rhaos4.12.el9.aarch64.rpm
podman-tests-4.2.0-5.rhaos4.12.el9.aarch64.rpm
skopeo-1.9.4-2.rhaos4.12.el9.aarch64.rpm
skopeo-debuginfo-1.9.4-2.rhaos4.12.el9.aarch64.rpm
skopeo-debugsource-1.9.4-2.rhaos4.12.el9.aarch64.rpm
skopeo-tests-1.9.4-2.rhaos4.12.el9.aarch64.rpm

noarch:
podman-docker-4.2.0-5.rhaos4.12.el9.noarch.rpm

ppc64le:
buildah-1.23.4-4.rhaos4.12.el9.ppc64le.rpm
buildah-debuginfo-1.23.4-4.rhaos4.12.el9.ppc64le.rpm
buildah-debugsource-1.23.4-4.rhaos4.12.el9.ppc64le.rpm
buildah-tests-1.23.4-4.rhaos4.12.el9.ppc64le.rpm
buildah-tests-debuginfo-1.23.4-4.rhaos4.12.el9.ppc64le.rpm
conmon-2.1.2-4.rhaos4.12.el9.ppc64le.rpm
conmon-debuginfo-2.1.2-4.rhaos4.12.el9.ppc64le.rpm
conmon-debugsource-2.1.2-4.rhaos4.12.el9.ppc64le.rpm
crun-1.4.2-3.rhaos4.12.el9.ppc64le.rpm
crun-debuginfo-1.4.2-3.rhaos4.12.el9.ppc64le.rpm
crun-debugsource-1.4.2-3.rhaos4.12.el9.ppc64le.rpm
openshift-clients-4.12.0-202301312133.p0.gb05f7d4.assembly.stream.el9.ppc64le.rpm
podman-4.2.0-5.rhaos4.12.el9.ppc64le.rpm
podman-catatonit-4.2.0-5.rhaos4.12.el9.ppc64le.rpm
podman-catatonit-debuginfo-4.2.0-5.rhaos4.12.el9.ppc64le.rpm
podman-debuginfo-4.2.0-5.rhaos4.12.el9.ppc64le.rpm
podman-debugsource-4.2.0-5.rhaos4.12.el9.ppc64le.rpm
podman-gvproxy-4.2.0-5.rhaos4.12.el9.ppc64le.rpm
podman-gvproxy-debuginfo-4.2.0-5.rhaos4.12.el9.ppc64le.rpm
podman-plugins-4.2.0-5.rhaos4.12.el9.ppc64le.rpm
podman-plugins-debuginfo-4.2.0-5.rhaos4.12.el9.ppc64le.rpm
podman-remote-4.2.0-5.rhaos4.12.el9.ppc64le.rpm
podman-remote-debuginfo-4.2.0-5.rhaos4.12.el9.ppc64le.rpm
podman-tests-4.2.0-5.rhaos4.12.el9.ppc64le.rpm
skopeo-1.9.4-2.rhaos4.12.el9.ppc64le.rpm
skopeo-debuginfo-1.9.4-2.rhaos4.12.el9.ppc64le.rpm
skopeo-debugsource-1.9.4-2.rhaos4.12.el9.ppc64le.rpm
skopeo-tests-1.9.4-2.rhaos4.12.el9.ppc64le.rpm

s390x:
buildah-1.23.4-4.rhaos4.12.el9.s390x.rpm
buildah-debuginfo-1.23.4-4.rhaos4.12.el9.s390x.rpm
buildah-debugsource-1.23.4-4.rhaos4.12.el9.s390x.rpm
buildah-tests-1.23.4-4.rhaos4.12.el9.s390x.rpm
buildah-tests-debuginfo-1.23.4-4.rhaos4.12.el9.s390x.rpm
conmon-2.1.2-4.rhaos4.12.el9.s390x.rpm
conmon-debuginfo-2.1.2-4.rhaos4.12.el9.s390x.rpm
conmon-debugsource-2.1.2-4.rhaos4.12.el9.s390x.rpm
crun-1.4.2-3.rhaos4.12.el9.s390x.rpm
crun-debuginfo-1.4.2-3.rhaos4.12.el9.s390x.rpm
crun-debugsource-1.4.2-3.rhaos4.12.el9.s390x.rpm
openshift-clients-4.12.0-202301312133.p0.gb05f7d4.assembly.stream.el9.s390x.rpm
podman-4.2.0-5.rhaos4.12.el9.s390x.rpm
podman-catatonit-4.2.0-5.rhaos4.12.el9.s390x.rpm
podman-catatonit-debuginfo-4.2.0-5.rhaos4.12.el9.s390x.rpm
podman-debuginfo-4.2.0-5.rhaos4.12.el9.s390x.rpm
podman-debugsource-4.2.0-5.rhaos4.12.el9.s390x.rpm
podman-gvproxy-4.2.0-5.rhaos4.12.el9.s390x.rpm
podman-gvproxy-debuginfo-4.2.0-5.rhaos4.12.el9.s390x.rpm
podman-plugins-4.2.0-5.rhaos4.12.el9.s390x.rpm
podman-plugins-debuginfo-4.2.0-5.rhaos4.12.el9.s390x.rpm
podman-remote-4.2.0-5.rhaos4.12.el9.s390x.rpm
podman-remote-debuginfo-4.2.0-5.rhaos4.12.el9.s390x.rpm
podman-tests-4.2.0-5.rhaos4.12.el9.s390x.rpm
skopeo-1.9.4-2.rhaos4.12.el9.s390x.rpm
skopeo-debuginfo-1.9.4-2.rhaos4.12.el9.s390x.rpm
skopeo-debugsource-1.9.4-2.rhaos4.12.el9.s390x.rpm
skopeo-tests-1.9.4-2.rhaos4.12.el9.s390x.rpm

x86_64:
buildah-1.23.4-4.rhaos4.12.el9.x86_64.rpm
buildah-debuginfo-1.23.4-4.rhaos4.12.el9.x86_64.rpm
buildah-debugsource-1.23.4-4.rhaos4.12.el9.x86_64.rpm
buildah-tests-1.23.4-4.rhaos4.12.el9.x86_64.rpm
buildah-tests-debuginfo-1.23.4-4.rhaos4.12.el9.x86_64.rpm
conmon-2.1.2-4.rhaos4.12.el9.x86_64.rpm
conmon-debuginfo-2.1.2-4.rhaos4.12.el9.x86_64.rpm
conmon-debugsource-2.1.2-4.rhaos4.12.el9.x86_64.rpm
crun-1.4.2-3.rhaos4.12.el9.x86_64.rpm
crun-debuginfo-1.4.2-3.rhaos4.12.el9.x86_64.rpm
crun-debugsource-1.4.2-3.rhaos4.12.el9.x86_64.rpm
openshift-clients-4.12.0-202301312133.p0.gb05f7d4.assembly.stream.el9.x86_64.rpm
openshift-clients-redistributable-4.12.0-202301312133.p0.gb05f7d4.assembly.stream.el9.x86_64.rpm
podman-4.2.0-5.rhaos4.12.el9.x86_64.rpm
podman-catatonit-4.2.0-5.rhaos4.12.el9.x86_64.rpm
podman-catatonit-debuginfo-4.2.0-5.rhaos4.12.el9.x86_64.rpm
podman-debuginfo-4.2.0-5.rhaos4.12.el9.x86_64.rpm
podman-debugsource-4.2.0-5.rhaos4.12.el9.x86_64.rpm
podman-gvproxy-4.2.0-5.rhaos4.12.el9.x86_64.rpm
podman-gvproxy-debuginfo-4.2.0-5.rhaos4.12.el9.x86_64.rpm
podman-plugins-4.2.0-5.rhaos4.12.el9.x86_64.rpm
podman-plugins-debuginfo-4.2.0-5.rhaos4.12.el9.x86_64.rpm
podman-remote-4.2.0-5.rhaos4.12.el9.x86_64.rpm
podman-remote-debuginfo-4.2.0-5.rhaos4.12.el9.x86_64.rpm
podman-tests-4.2.0-5.rhaos4.12.el9.x86_64.rpm
skopeo-1.9.4-2.rhaos4.12.el9.x86_64.rpm
skopeo-debuginfo-1.9.4-2.rhaos4.12.el9.x86_64.rpm
skopeo-debugsource-1.9.4-2.rhaos4.12.el9.x86_64.rpm
skopeo-tests-1.9.4-2.rhaos4.12.el9.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2022-2879
https://access.redhat.com/security/cve/CVE-2022-2880
https://access.redhat.com/security/cve/CVE-2022-41715
https://access.redhat.com/security/updates/classification/#moderate

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=hUKM
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

Ubuntu Security Notice USN-6038-2

Ubuntu Security Notice 6038-2 - USN-6038-1 fixed several vulnerabilities in Go 1.18. This update provides the corresponding updates for Go 1.13 and Go 1.16. CVE-2022-29526 and CVE-2022-30630 only affected Go 1.16. It was discovered that the Go net/http module incorrectly handled Transfer-Encoding headers in the HTTP/1 client. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack.

Gentoo Linux Security Advisory 202311-09

Gentoo Linux Security Advisory 202311-9 - Multiple vulnerabilities have been discovered in Go, the worst of which could lead to remote code execution. Versions greater than or equal to 1.20.10 are affected.

Red Hat Security Advisory 2023-4003-01

Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.

RHSA-2023:3915: Red Hat Security Advisory: OpenShift Container Platform 4.11.44 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS...

RHSA-2023:3742: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.0 security and bug fix update

Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...

Red Hat Security Advisory 2023-3664-01

Red Hat Security Advisory 2023-3664-01 - Release of Security Advisory for the OpenShift Jenkins image and Jenkins agent base image.

Red Hat Security Advisory 2023-3624-01

Red Hat Security Advisory 2023-3624-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.

RHSA-2023:3645: Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.7 security update

Red Hat OpenShift Service Mesh 2.2.7 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-20329: A flaw was found in Mongo. Specific cstrings input may not be properly validated in the MongoDB Go Driver when marshaling Go objects into BSON. This flaw allows a malicious user to use a Go object with a specific string to inject additional fields into marshaled documents. * CVE-2021-43138: A vulnerability was found in the async package. This flaw allows a malicious user to obtai...

RHSA-2023:3624: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.10 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...

RHSA-2023:0584: Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.1 security update

Secondary Scheduler Operator for Red Hat OpenShift 1.1.1 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query ...

RHSA-2023:3205: Red Hat Security Advisory: OpenShift Virtualization 4.13.0 Images security, bug fix, and enhancement update

Red Hat OpenShift Virtualization release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded...

RHSA-2023:2780: Red Hat Security Advisory: Image Builder security, bug fix, and enhancement update

An update for cockpit-composer, osbuild, osbuild-composer, and weldr-client is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, ...

RHSA-2023:2204: Red Hat Security Advisory: Image Builder security, bug fix, and enhancement update

An update for cockpit-composer, osbuild, osbuild-composer, and weldr-client is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, ...

RHSA-2023:2167: Red Hat Security Advisory: grafana security and enhancement update

An update for grafana is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy saniti...

Red Hat Security Advisory 2023-2041-01

Red Hat Security Advisory 2023-2041-01 - Migration Toolkit for Applications 6.1.0 Images. Issues addressed include denial of service, privilege escalation, server-side request forgery, and traversal vulnerabilities.

Ubuntu Security Notice USN-6038-1

Ubuntu Security Notice 6038-1 - It was discovered that the Go net/http module incorrectly handled Transfer-Encoding headers in the HTTP/1 client. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack. It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting into a denial of service.

CVE-2023-21954: Oracle Critical Patch Update Advisory - April 2023

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...

RHSA-2023:1529: Red Hat Security Advisory: Service Telemetry Framework 1.5 security update

An update is now available for Service Telemetry Framework 1.5. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating "chunked" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid. * CVE-2022-23772: A flaw was found in the big package of the math library in golang. The Rat....

RHSA-2023:1428: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.8 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.8 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36567: A flaw was found in gin. This issue occurs when the default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path. * CVE-2022-24999: A flaw was found in the express.js npm package. Express.js Express is vulnerable to a d...

RHSA-2023:1275: Red Hat Security Advisory: Red Hat OpenStack Platform (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating "chunked" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid. * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by rev...

Red Hat Security Advisory 2023-1174-01

Red Hat Security Advisory 2023-1174-01 - OpenShift API for Data Protection (OADP) 1.1.2 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate.

Red Hat Security Advisory 2023-1042-01

Red Hat Security Advisory 2023-1042-01 - Custom Metrics Autoscaler Operator for Red Hat OpenShift including security updates.

Red Hat Security Advisory 2023-1079-01

Red Hat Security Advisory 2023-1079-01 - An update for osp-director-downloader-container, osp-director-agent-container and osp-director-operator-container is now available for Red Hat OpenStack Platform 16.2 (Train).

RHSA-2023:1079: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (osp-director-downloader-container, osp-director-agent-container and osp-director-operator-container) security update

An update for osp-director-downloader-container, osp-director-agent-container and osp-director-operator-container is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to c...

RHSA-2023:0774: Red Hat Security Advisory: OpenShift Container Platform 4.11.28 security update

Red Hat OpenShift Container Platform release 4.11.28 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This issu...

RHSA-2023:0769: Red Hat Security Advisory: OpenShift Container Platform 4.12.4 security update

Red Hat OpenShift Container Platform release 4.12.4 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total numb...

RHSA-2023:0727: Red Hat Security Advisory: OpenShift Container Platform 4.12.3 security update

Red Hat OpenShift Container Platform release 4.12.3 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks t...

Red Hat Security Advisory 2023-0708-01

Red Hat Security Advisory 2023-0708-01 - Red Hat OpenShift Serverless Client kn 1.27.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.27.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.

Red Hat Security Advisory 2023-0708-01

Red Hat Security Advisory 2023-0708-01 - Red Hat OpenShift Serverless Client kn 1.27.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.27.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.

Red Hat Security Advisory 2023-0708-01

Red Hat Security Advisory 2023-0708-01 - Red Hat OpenShift Serverless Client kn 1.27.0 provides a CLI to interact with Red Hat OpenShift Serverless 1.27.0. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms.

RHSA-2023:0709: Red Hat Security Advisory: Release of OpenShift Serverless 1.27.0

Release of OpenShift Serverless 1.27.0 The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic. * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query para...

Red Hat Security Advisory 2023-0445-01

Red Hat Security Advisory 2023-0445-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Red Hat Security Advisory 2023-0445-01

Red Hat Security Advisory 2023-0445-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

RHSA-2023:0446: Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update

An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-41715: golang: regexp/syntax: limit memory used by parsing regexps

RHSA-2023:0446: Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update

An update for the go-toolset:rhel8 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-41715: golang: regexp/syntax: limit memory used by parsing regexps

RHSA-2023:0445: Red Hat Security Advisory: go-toolset-1.18 security update

An update for go-toolset-1.18 and go-toolset-1.18-golang is now available for Red Hat Developer Tools. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-41715: golang: regexp/syntax: limit memory used by parsing regexps

RHSA-2023:0445: Red Hat Security Advisory: go-toolset-1.18 security update

An update for go-toolset-1.18 and go-toolset-1.18-golang is now available for Red Hat Developer Tools. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-41715: golang: regexp/syntax: limit memory used by parsing regexps

RHSA-2023:0328: Red Hat Security Advisory: go-toolset and golang security and bug fix update

An update for go-toolset and golang is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-41715: golang: regexp/syntax: limit memory used by parsing regexps

Red Hat Security Advisory 2023-0264-01

Red Hat Security Advisory 2023-0264-01 - An update for Logging Subsystem (5.6.0) is now available for Red Hat OpenShift Container Platform. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-0264-01

Red Hat Security Advisory 2023-0264-01 - An update for Logging Subsystem (5.6.0) is now available for Red Hat OpenShift Container Platform. Issues addressed include a denial of service vulnerability.

RHSA-2023:0264: Red Hat Security Advisory: Red Hat OpenShift (Logging Subsystem) security update

An update for Logging Subsystem (5.6.0) is now available for Red Hat OpenShift Container Platform. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server error...

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

Red Hat Security Advisory 2022-7399-01

Red Hat Security Advisory 2022-7399-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. Issues addressed include denial of service, memory leak, and out of bounds read vulnerabilities.

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

RHSA-2022:7399: Red Hat Security Advisory: OpenShift Container Platform 4.12.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.12.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS * CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header * CVE-2022-2879: golang: arc...

Red Hat Security Advisory 2022-8781-01

Red Hat Security Advisory 2022-8781-01 - Logging Subsystem for Red Hat OpenShift has a security update. Issues addressed include a denial of service vulnerability.

RHSA-2022:8781: Red Hat Security Advisory: Logging Subsystem 5.5.5 - Red Hat OpenShift security update

Logging Subsystem 5.5.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32189: golang: math/b...

RHSA-2022:8781: Red Hat Security Advisory: Logging Subsystem 5.5.5 - Red Hat OpenShift security update

Logging Subsystem 5.5.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32189: golang: math/b...

RHSA-2022:8781: Red Hat Security Advisory: Logging Subsystem 5.5.5 - Red Hat OpenShift security update

Logging Subsystem 5.5.5 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-2879: golang: archive/tar: unbounded memory consumption when reading headers * CVE-2022-2880: golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters * CVE-2022-27664: golang: net/http: handle server errors after sending GOAWAY * CVE-2022-32189: golang: math/b...

CVE-2022-2879: archive/tar: unbounded memory consumption when reading headers · Issue #54853 · golang/go

Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB.

CVE-2022-2880: net/http/httputil: ReverseProxy should not forward unparseable query parameters · Issue #54663 · golang/go

Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.

CVE-2022-39278: Announcing Istio 1.13.9

Istio is an open platform-independent service mesh that provides traffic management, policy enforcement, and telemetry collection. Prior to versions 1.15.2, 1.14.5, and 1.13.9, the Istio control plane, istiod, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted or oversized message which results in the control plane crashing when the Kubernetes validating or mutating webhook service is exposed publicly. This endpoint is served over TLS port 15017, but does not require any authentication from the attacker. For simple installations, Istiod is typically only reachable from within the cluster, limiting the blast radius. However, for some deployments, especially external istiod topologies, this port is exposed over the public internet. Versions 1.15.2, 1.14.5, and 1.13.9 contain patches for this issue. There are no effective workarounds, beyond upgrading. This bug is due to an error in `regexp.Compile` in Go.

CVE-2021-21285: Docker Engine release notes

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

CVE-2021-21285: Docker Engine release notes

In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.

Packet Storm: Latest News

Ivanti EPM Agent Portal Command Execution