Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2023-3409-01

Red Hat Security Advisory 2023-3409-01 - Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.20.

Packet Storm
#vulnerability#web#red_hat#redis#nodejs#git#java#kubernetes#rpm#jira#wifi

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: OpenShift Container Platform 4.12.20 packages and security update
Advisory ID: RHSA-2023:3409-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3409
Issue date: 2023-06-07
CVE Names: CVE-2023-24540
=====================================================================

  1. Summary:

Red Hat OpenShift Container Platform release 4.12.20 is now available with
updates to packages and images that fix several bugs and add enhancements.

This release includes a security update for Red Hat OpenShift Container
Platform 4.12.

Red Hat Product Security has rated this update as having a security impact
of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Ironic content for Red Hat OpenShift Container Platform 4.12 - noarch
Red Hat OpenShift Container Platform 4.12 - aarch64, noarch, ppc64le, s390x, x86_64

  1. Description:

Red Hat OpenShift Container Platform is Red Hat’s cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.12.20. See the following advisory for the container images for
this release:

https://access.redhat.com/errata/RHSA-2023:3410

Security Fix(es):

  • golang: html/template: improper handling of JavaScript whitespace
    (CVE-2023-24540)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

All OpenShift Container Platform 4.12 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift CLI (oc)
or web console. Instructions for upgrading a cluster are available at
https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html

  1. Solution:

For OpenShift Container Platform 4.12 see the following documentation,
which will be updated shortly for this release, for important instructions
on how to upgrade your cluster and fully apply this asynchronous errata
update:

https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html

  1. Bugs fixed (https://bugzilla.redhat.com/):

2196027 - CVE-2023-24540 golang: html/template: improper handling of JavaScript whitespace

  1. Package List:

Red Hat OpenShift Container Platform 4.12:

Source:
NetworkManager-1.36.0-14.el8_6.src.rpm
buildah-1.23.4-4.1.rhaos4.12.el8.src.rpm
cri-o-1.25.3-5.rhaos4.12.git44a2cb2.el8.src.rpm
openshift-4.12.0-202305301919.p0.g3fe2906.assembly.stream.el8.src.rpm
openshift-clients-4.12.0-202305301015.p0.g97c75d0.assembly.stream.el8.src.rpm
skopeo-1.9.4-2.1.rhaos4.12.el8.src.rpm

aarch64:
NetworkManager-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-adsl-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-adsl-debuginfo-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-bluetooth-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-bluetooth-debuginfo-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-cloud-setup-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-cloud-setup-debuginfo-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-debuginfo-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-debugsource-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-libnm-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-libnm-debuginfo-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-libnm-devel-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-ovs-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-ovs-debuginfo-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-ppp-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-ppp-debuginfo-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-team-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-team-debuginfo-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-tui-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-tui-debuginfo-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-wifi-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-wifi-debuginfo-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-wwan-1.36.0-14.el8_6.aarch64.rpm
NetworkManager-wwan-debuginfo-1.36.0-14.el8_6.aarch64.rpm
buildah-1.23.4-4.1.rhaos4.12.el8.aarch64.rpm
buildah-debuginfo-1.23.4-4.1.rhaos4.12.el8.aarch64.rpm
buildah-debugsource-1.23.4-4.1.rhaos4.12.el8.aarch64.rpm
buildah-tests-1.23.4-4.1.rhaos4.12.el8.aarch64.rpm
buildah-tests-debuginfo-1.23.4-4.1.rhaos4.12.el8.aarch64.rpm
cri-o-1.25.3-5.rhaos4.12.git44a2cb2.el8.aarch64.rpm
cri-o-debuginfo-1.25.3-5.rhaos4.12.git44a2cb2.el8.aarch64.rpm
cri-o-debugsource-1.25.3-5.rhaos4.12.git44a2cb2.el8.aarch64.rpm
openshift-clients-4.12.0-202305301015.p0.g97c75d0.assembly.stream.el8.aarch64.rpm
openshift-hyperkube-4.12.0-202305301919.p0.g3fe2906.assembly.stream.el8.aarch64.rpm
skopeo-1.9.4-2.1.rhaos4.12.el8.aarch64.rpm
skopeo-debuginfo-1.9.4-2.1.rhaos4.12.el8.aarch64.rpm
skopeo-debugsource-1.9.4-2.1.rhaos4.12.el8.aarch64.rpm
skopeo-tests-1.9.4-2.1.rhaos4.12.el8.aarch64.rpm

noarch:
NetworkManager-config-connectivity-redhat-1.36.0-14.el8_6.noarch.rpm
NetworkManager-config-server-1.36.0-14.el8_6.noarch.rpm
NetworkManager-dispatcher-routing-rules-1.36.0-14.el8_6.noarch.rpm

ppc64le:
NetworkManager-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-adsl-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-adsl-debuginfo-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-bluetooth-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-bluetooth-debuginfo-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-cloud-setup-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-cloud-setup-debuginfo-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-debuginfo-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-debugsource-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-libnm-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-libnm-debuginfo-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-libnm-devel-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-ovs-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-ovs-debuginfo-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-ppp-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-ppp-debuginfo-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-team-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-team-debuginfo-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-tui-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-tui-debuginfo-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-wifi-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-wifi-debuginfo-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-wwan-1.36.0-14.el8_6.ppc64le.rpm
NetworkManager-wwan-debuginfo-1.36.0-14.el8_6.ppc64le.rpm
buildah-1.23.4-4.1.rhaos4.12.el8.ppc64le.rpm
buildah-debuginfo-1.23.4-4.1.rhaos4.12.el8.ppc64le.rpm
buildah-debugsource-1.23.4-4.1.rhaos4.12.el8.ppc64le.rpm
buildah-tests-1.23.4-4.1.rhaos4.12.el8.ppc64le.rpm
buildah-tests-debuginfo-1.23.4-4.1.rhaos4.12.el8.ppc64le.rpm
cri-o-1.25.3-5.rhaos4.12.git44a2cb2.el8.ppc64le.rpm
cri-o-debuginfo-1.25.3-5.rhaos4.12.git44a2cb2.el8.ppc64le.rpm
cri-o-debugsource-1.25.3-5.rhaos4.12.git44a2cb2.el8.ppc64le.rpm
openshift-clients-4.12.0-202305301015.p0.g97c75d0.assembly.stream.el8.ppc64le.rpm
openshift-hyperkube-4.12.0-202305301919.p0.g3fe2906.assembly.stream.el8.ppc64le.rpm
skopeo-1.9.4-2.1.rhaos4.12.el8.ppc64le.rpm
skopeo-debuginfo-1.9.4-2.1.rhaos4.12.el8.ppc64le.rpm
skopeo-debugsource-1.9.4-2.1.rhaos4.12.el8.ppc64le.rpm
skopeo-tests-1.9.4-2.1.rhaos4.12.el8.ppc64le.rpm

s390x:
NetworkManager-1.36.0-14.el8_6.s390x.rpm
NetworkManager-adsl-1.36.0-14.el8_6.s390x.rpm
NetworkManager-adsl-debuginfo-1.36.0-14.el8_6.s390x.rpm
NetworkManager-bluetooth-1.36.0-14.el8_6.s390x.rpm
NetworkManager-bluetooth-debuginfo-1.36.0-14.el8_6.s390x.rpm
NetworkManager-cloud-setup-1.36.0-14.el8_6.s390x.rpm
NetworkManager-cloud-setup-debuginfo-1.36.0-14.el8_6.s390x.rpm
NetworkManager-debuginfo-1.36.0-14.el8_6.s390x.rpm
NetworkManager-debugsource-1.36.0-14.el8_6.s390x.rpm
NetworkManager-libnm-1.36.0-14.el8_6.s390x.rpm
NetworkManager-libnm-debuginfo-1.36.0-14.el8_6.s390x.rpm
NetworkManager-libnm-devel-1.36.0-14.el8_6.s390x.rpm
NetworkManager-ovs-1.36.0-14.el8_6.s390x.rpm
NetworkManager-ovs-debuginfo-1.36.0-14.el8_6.s390x.rpm
NetworkManager-ppp-1.36.0-14.el8_6.s390x.rpm
NetworkManager-ppp-debuginfo-1.36.0-14.el8_6.s390x.rpm
NetworkManager-team-1.36.0-14.el8_6.s390x.rpm
NetworkManager-team-debuginfo-1.36.0-14.el8_6.s390x.rpm
NetworkManager-tui-1.36.0-14.el8_6.s390x.rpm
NetworkManager-tui-debuginfo-1.36.0-14.el8_6.s390x.rpm
NetworkManager-wifi-1.36.0-14.el8_6.s390x.rpm
NetworkManager-wifi-debuginfo-1.36.0-14.el8_6.s390x.rpm
NetworkManager-wwan-1.36.0-14.el8_6.s390x.rpm
NetworkManager-wwan-debuginfo-1.36.0-14.el8_6.s390x.rpm
buildah-1.23.4-4.1.rhaos4.12.el8.s390x.rpm
buildah-debuginfo-1.23.4-4.1.rhaos4.12.el8.s390x.rpm
buildah-debugsource-1.23.4-4.1.rhaos4.12.el8.s390x.rpm
buildah-tests-1.23.4-4.1.rhaos4.12.el8.s390x.rpm
buildah-tests-debuginfo-1.23.4-4.1.rhaos4.12.el8.s390x.rpm
cri-o-1.25.3-5.rhaos4.12.git44a2cb2.el8.s390x.rpm
cri-o-debuginfo-1.25.3-5.rhaos4.12.git44a2cb2.el8.s390x.rpm
cri-o-debugsource-1.25.3-5.rhaos4.12.git44a2cb2.el8.s390x.rpm
openshift-clients-4.12.0-202305301015.p0.g97c75d0.assembly.stream.el8.s390x.rpm
openshift-hyperkube-4.12.0-202305301919.p0.g3fe2906.assembly.stream.el8.s390x.rpm
skopeo-1.9.4-2.1.rhaos4.12.el8.s390x.rpm
skopeo-debuginfo-1.9.4-2.1.rhaos4.12.el8.s390x.rpm
skopeo-debugsource-1.9.4-2.1.rhaos4.12.el8.s390x.rpm
skopeo-tests-1.9.4-2.1.rhaos4.12.el8.s390x.rpm

x86_64:
NetworkManager-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-adsl-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-adsl-debuginfo-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-bluetooth-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-bluetooth-debuginfo-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-cloud-setup-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-cloud-setup-debuginfo-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-debuginfo-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-debugsource-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-libnm-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-libnm-debuginfo-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-libnm-devel-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-ovs-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-ovs-debuginfo-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-ppp-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-ppp-debuginfo-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-team-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-team-debuginfo-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-tui-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-tui-debuginfo-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-wifi-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-wifi-debuginfo-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-wwan-1.36.0-14.el8_6.x86_64.rpm
NetworkManager-wwan-debuginfo-1.36.0-14.el8_6.x86_64.rpm
buildah-1.23.4-4.1.rhaos4.12.el8.x86_64.rpm
buildah-debuginfo-1.23.4-4.1.rhaos4.12.el8.x86_64.rpm
buildah-debugsource-1.23.4-4.1.rhaos4.12.el8.x86_64.rpm
buildah-tests-1.23.4-4.1.rhaos4.12.el8.x86_64.rpm
buildah-tests-debuginfo-1.23.4-4.1.rhaos4.12.el8.x86_64.rpm
cri-o-1.25.3-5.rhaos4.12.git44a2cb2.el8.x86_64.rpm
cri-o-debuginfo-1.25.3-5.rhaos4.12.git44a2cb2.el8.x86_64.rpm
cri-o-debugsource-1.25.3-5.rhaos4.12.git44a2cb2.el8.x86_64.rpm
openshift-clients-4.12.0-202305301015.p0.g97c75d0.assembly.stream.el8.x86_64.rpm
openshift-clients-redistributable-4.12.0-202305301015.p0.g97c75d0.assembly.stream.el8.x86_64.rpm
openshift-hyperkube-4.12.0-202305301919.p0.g3fe2906.assembly.stream.el8.x86_64.rpm
skopeo-1.9.4-2.1.rhaos4.12.el8.x86_64.rpm
skopeo-debuginfo-1.9.4-2.1.rhaos4.12.el8.x86_64.rpm
skopeo-debugsource-1.9.4-2.1.rhaos4.12.el8.x86_64.rpm
skopeo-tests-1.9.4-2.1.rhaos4.12.el8.x86_64.rpm

Red Hat OpenShift Container Platform 4.12:

Source:
cri-o-1.25.3-5.rhaos4.12.git44a2cb2.el9.src.rpm
openshift-4.12.0-202305301919.p0.g3fe2906.assembly.stream.el9.src.rpm
openshift-clients-4.12.0-202305301015.p0.g97c75d0.assembly.stream.el9.src.rpm

aarch64:
cri-o-1.25.3-5.rhaos4.12.git44a2cb2.el9.aarch64.rpm
cri-o-debuginfo-1.25.3-5.rhaos4.12.git44a2cb2.el9.aarch64.rpm
cri-o-debugsource-1.25.3-5.rhaos4.12.git44a2cb2.el9.aarch64.rpm
openshift-clients-4.12.0-202305301015.p0.g97c75d0.assembly.stream.el9.aarch64.rpm
openshift-hyperkube-4.12.0-202305301919.p0.g3fe2906.assembly.stream.el9.aarch64.rpm

ppc64le:
cri-o-1.25.3-5.rhaos4.12.git44a2cb2.el9.ppc64le.rpm
cri-o-debuginfo-1.25.3-5.rhaos4.12.git44a2cb2.el9.ppc64le.rpm
cri-o-debugsource-1.25.3-5.rhaos4.12.git44a2cb2.el9.ppc64le.rpm
openshift-clients-4.12.0-202305301015.p0.g97c75d0.assembly.stream.el9.ppc64le.rpm
openshift-hyperkube-4.12.0-202305301919.p0.g3fe2906.assembly.stream.el9.ppc64le.rpm

s390x:
cri-o-1.25.3-5.rhaos4.12.git44a2cb2.el9.s390x.rpm
cri-o-debuginfo-1.25.3-5.rhaos4.12.git44a2cb2.el9.s390x.rpm
cri-o-debugsource-1.25.3-5.rhaos4.12.git44a2cb2.el9.s390x.rpm
openshift-clients-4.12.0-202305301015.p0.g97c75d0.assembly.stream.el9.s390x.rpm
openshift-hyperkube-4.12.0-202305301919.p0.g3fe2906.assembly.stream.el9.s390x.rpm

x86_64:
cri-o-1.25.3-5.rhaos4.12.git44a2cb2.el9.x86_64.rpm
cri-o-debuginfo-1.25.3-5.rhaos4.12.git44a2cb2.el9.x86_64.rpm
cri-o-debugsource-1.25.3-5.rhaos4.12.git44a2cb2.el9.x86_64.rpm
openshift-clients-4.12.0-202305301015.p0.g97c75d0.assembly.stream.el9.x86_64.rpm
openshift-clients-redistributable-4.12.0-202305301015.p0.g97c75d0.assembly.stream.el9.x86_64.rpm
openshift-hyperkube-4.12.0-202305301919.p0.g3fe2906.assembly.stream.el9.x86_64.rpm

Ironic content for Red Hat OpenShift Container Platform 4.12:

Source:
openstack-ironic-21.0.1-0.20230510075533.c4154f7.el9.src.rpm

noarch:
openstack-ironic-21.0.1-0.20230510075533.c4154f7.el9.noarch.rpm
openstack-ironic-api-21.0.1-0.20230510075533.c4154f7.el9.noarch.rpm
openstack-ironic-common-21.0.1-0.20230510075533.c4154f7.el9.noarch.rpm
openstack-ironic-conductor-21.0.1-0.20230510075533.c4154f7.el9.noarch.rpm
openstack-ironic-dnsmasq-tftp-server-21.0.1-0.20230510075533.c4154f7.el9.noarch.rpm
python3-ironic-tests-21.0.1-0.20230510075533.c4154f7.el9.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2023-24540
https://access.redhat.com/security/updates/classification/#important
https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Qln+
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

Red Hat Security Advisory 2024-4119-03

Red Hat Security Advisory 2024-4119-03 - Updated rhceph-5.3 container image is now available in the Red Hat Ecosystem Catalog. Issues addressed include a code execution vulnerability.

Red Hat Security Advisory 2023-5442-01

Red Hat Security Advisory 2023-5442-01 - Red Hat Advanced Cluster Management for Kubernetes 2.8.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

RHSA-2023:5376: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.3 security and bug fix update

Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.13.3 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts ...

Red Hat Security Advisory 2023-4664-01

Red Hat Security Advisory 2023-4664-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.3 images. Issues addressed include a denial of service vulnerability.

RHSA-2023:4627: Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update

Migration Toolkit for Applications 6.2.0 release Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46877: A flaw was found in Jackson Databind. This issue may allow a malicious user to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization. * CVE-2022-4492: A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a...

Red Hat Security Advisory 2023-4289-01

Red Hat Security Advisory 2023-4289-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes.

RHSA-2023:4289: Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.11 security and bug fix update

OpenShift API for Data Protection (OADP) 1.0.11 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.

Red Hat Security Advisory 2023-3925-01

Red Hat Security Advisory 2023-3925-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.23.

Red Hat Security Advisory 2023-3914-01

Red Hat Security Advisory 2023-3914-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.44.

Red Hat Security Advisory 2023-3911-01

Red Hat Security Advisory 2023-3911-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.63.

RHSA-2023:3910: Red Hat Security Advisory: Red Hat OpenShift Enterprise security update

Red Hat OpenShift Container Platform release 4.10.63 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server...

RHSA-2023:3905: Red Hat Security Advisory: Network observability 1.3.0 for Openshift

Network Observability 1.3.0 for OpenShift Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted input. * CVE-2023-24540: A flaw was found in golang,...

Red Hat Security Advisory 2023-3614-01

Red Hat Security Advisory 2023-3614-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.4.

Red Hat Security Advisory 2023-3644-01

Red Hat Security Advisory 2023-3644-01 - Red Hat OpenShift Service Mesh is the Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. This advisory covers container images for the release.

RHSA-2023:3624: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.10 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...

RHSA-2023:3545: Red Hat Security Advisory: OpenShift Container Platform 4.12.21 packages and security update

Red Hat OpenShift Container Platform release 4.12.21 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside ...

Red Hat Security Advisory 2023-3410-01

Red Hat Security Advisory 2023-3410-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.20.

Red Hat Security Advisory 2023-3366-01

Red Hat Security Advisory 2023-3366-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.2. Issues addressed include a traversal vulnerability.

RHSA-2023:3366: Red Hat Security Advisory: OpenShift Container Platform 4.13.2 packages and security update

Red Hat OpenShift Container Platform release 4.13.2 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms...

Ubuntu Security Notice USN-6140-1

Ubuntu Security Notice 6140-1 - It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10. It was discovered that Go did not properly validate the amount of memory and disk files ReadForm can consume. An attacker could possibly use this issue to cause a panic resulting in a denial of service. This issue only affected golang-1.19 on Ubuntu 22.10.

Red Hat Security Advisory 2023-3445-01

Red Hat Security Advisory 2023-3445-01 - An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Issues addressed include a denial of service vulnerability.

RHSA-2023:3445: Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update

An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...

Red Hat Security Advisory 2023-3379-01

Red Hat Security Advisory 2023-3379-01 - Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). The updated image includes security fixes. This release of RHACS includes a fix for CVE-2023-24540 by building RHACS with updated Golang.

RHSA-2023:3435: Red Hat Security Advisory: Red Hat Advanced Cluster Security 3.74 for Kubernetes security update

An update is now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted inpu...

Red Hat Security Advisory 2023-3415-01

Red Hat Security Advisory 2023-3415-01 - Updated images are now available for Red Hat Advanced Cluster Security (RHACS). The updated image includes security and bug fixes.

Red Hat Security Advisory 2023-3323-01

Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution