Headline
Red Hat Security Advisory 2023-3612-01
Red Hat Security Advisory 2023-3612-01 - Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.4. Issues addressed include a denial of service vulnerability.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: OpenShift Container Platform 4.13.4 packages and security update
Advisory ID: RHSA-2023:3612-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3612
Issue date: 2023-06-23
CVE Names: CVE-2022-41717 CVE-2022-41724 CVE-2022-41725
CVE-2023-24534 CVE-2023-24536 CVE-2023-24537
CVE-2023-24538 CVE-2023-24540 CVE-2023-27561
=====================================================================
- Summary:
Red Hat OpenShift Container Platform release 4.13.4 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release includes a security update for Red Hat OpenShift Container
Platform 4.13.
Red Hat Product Security has rated this update as having a security impact
of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat OpenShift Container Platform 4.13 - aarch64, noarch, ppc64le, s390x, x86_64
- Description:
Red Hat OpenShift Container Platform is Red Hat’s cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.13.4. See the following advisory for the container images for
this release:
https://access.redhat.com/errata/RHSA-2023:3614
Security Fix(es):
golang: html/template: improper handling of JavaScript whitespace
(CVE-2023-24540)golang: net/http: excessive memory growth in a Go server accepting HTTP/2
requests (CVE-2022-41717)golang: crypto/tls: large handshake records may cause panics
(CVE-2022-41724)golang: net/http, mime/multipart: denial of service from excessive
resource consumption (CVE-2022-41725)golang: net/http, net/textproto: denial of service from excessive memory
allocation (CVE-2023-24534)golang: net/http, net/textproto, mime/multipart: denial of service from
excessive resource consumption (CVE-2023-24536)golang: go/parser: Infinite loop in parsing (CVE-2023-24537)
golang: html/template: backticks not treated as string delimiters
(CVE-2023-24538)runc: volume mount race condition (regression of CVE 2019-19921)
(CVE-2023-27561)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
All OpenShift Container Platform 4.13 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift CLI (oc)
or web console. Instructions for upgrading a cluster are available at
https://docs.openshift.com/container-platform/4.13/updating/updating-cluster-cli.html
- Solution:
For OpenShift Container Platform 4.13 see the following documentation,
which will be updated shortly for this release, for important instructions
on how to upgrade your cluster and fully apply this asynchronous errata
update:
https://docs.openshift.com/container-platform/4.13/release_notes/ocp-4-13-release-notes.html
- Bugs fixed (https://bugzilla.redhat.com/):
2161274 - CVE-2022-41717 golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests
2175721 - CVE-2023-27561 runc: volume mount race condition (regression of CVE-2019-19921)
2178488 - CVE-2022-41725 golang: net/http, mime/multipart: denial of service from excessive resource consumption
2178492 - CVE-2022-41724 golang: crypto/tls: large handshake records may cause panics
2184481 - CVE-2023-24538 golang: html/template: backticks not treated as string delimiters
2184482 - CVE-2023-24536 golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption
2184483 - CVE-2023-24534 golang: net/http, net/textproto: denial of service from excessive memory allocation
2184484 - CVE-2023-24537 golang: go/parser: Infinite loop in parsing
2196027 - CVE-2023-24540 golang: html/template: improper handling of JavaScript whitespace
- Package List:
Red Hat OpenShift Container Platform 4.13:
Source:
buildah-1.29.1-2.rhaos4.13.el8.src.rpm
conmon-2.1.7-2.rhaos4.13.el8.src.rpm
containernetworking-plugins-1.0.1-7.rhaos4.13.el8.src.rpm
cri-o-1.26.3-9.rhaos4.13.git994242a.el8.src.rpm
openshift-4.13.0-202306072143.p0.g7d22122.assembly.stream.el8.src.rpm
podman-4.4.1-4.rhaos4.13.el8.src.rpm
runc-1.1.6-4.rhaos4.13.el8.src.rpm
skopeo-1.11.2-2.rhaos4.13.el8.src.rpm
aarch64:
buildah-1.29.1-2.rhaos4.13.el8.aarch64.rpm
buildah-debuginfo-1.29.1-2.rhaos4.13.el8.aarch64.rpm
buildah-debugsource-1.29.1-2.rhaos4.13.el8.aarch64.rpm
buildah-tests-1.29.1-2.rhaos4.13.el8.aarch64.rpm
buildah-tests-debuginfo-1.29.1-2.rhaos4.13.el8.aarch64.rpm
conmon-2.1.7-2.rhaos4.13.el8.aarch64.rpm
conmon-debuginfo-2.1.7-2.rhaos4.13.el8.aarch64.rpm
conmon-debugsource-2.1.7-2.rhaos4.13.el8.aarch64.rpm
containernetworking-plugins-1.0.1-7.rhaos4.13.el8.aarch64.rpm
containernetworking-plugins-debuginfo-1.0.1-7.rhaos4.13.el8.aarch64.rpm
containernetworking-plugins-debugsource-1.0.1-7.rhaos4.13.el8.aarch64.rpm
cri-o-1.26.3-9.rhaos4.13.git994242a.el8.aarch64.rpm
cri-o-debuginfo-1.26.3-9.rhaos4.13.git994242a.el8.aarch64.rpm
cri-o-debugsource-1.26.3-9.rhaos4.13.git994242a.el8.aarch64.rpm
openshift-hyperkube-4.13.0-202306072143.p0.g7d22122.assembly.stream.el8.aarch64.rpm
podman-4.4.1-4.rhaos4.13.el8.aarch64.rpm
podman-catatonit-4.4.1-4.rhaos4.13.el8.aarch64.rpm
podman-catatonit-debuginfo-4.4.1-4.rhaos4.13.el8.aarch64.rpm
podman-debuginfo-4.4.1-4.rhaos4.13.el8.aarch64.rpm
podman-debugsource-4.4.1-4.rhaos4.13.el8.aarch64.rpm
podman-gvproxy-4.4.1-4.rhaos4.13.el8.aarch64.rpm
podman-gvproxy-debuginfo-4.4.1-4.rhaos4.13.el8.aarch64.rpm
podman-plugins-4.4.1-4.rhaos4.13.el8.aarch64.rpm
podman-plugins-debuginfo-4.4.1-4.rhaos4.13.el8.aarch64.rpm
podman-remote-4.4.1-4.rhaos4.13.el8.aarch64.rpm
podman-remote-debuginfo-4.4.1-4.rhaos4.13.el8.aarch64.rpm
podman-tests-4.4.1-4.rhaos4.13.el8.aarch64.rpm
runc-1.1.6-4.rhaos4.13.el8.aarch64.rpm
runc-debuginfo-1.1.6-4.rhaos4.13.el8.aarch64.rpm
runc-debugsource-1.1.6-4.rhaos4.13.el8.aarch64.rpm
skopeo-1.11.2-2.rhaos4.13.el8.aarch64.rpm
skopeo-tests-1.11.2-2.rhaos4.13.el8.aarch64.rpm
noarch:
podman-docker-4.4.1-4.rhaos4.13.el8.noarch.rpm
ppc64le:
buildah-1.29.1-2.rhaos4.13.el8.ppc64le.rpm
buildah-debuginfo-1.29.1-2.rhaos4.13.el8.ppc64le.rpm
buildah-debugsource-1.29.1-2.rhaos4.13.el8.ppc64le.rpm
buildah-tests-1.29.1-2.rhaos4.13.el8.ppc64le.rpm
buildah-tests-debuginfo-1.29.1-2.rhaos4.13.el8.ppc64le.rpm
conmon-2.1.7-2.rhaos4.13.el8.ppc64le.rpm
conmon-debuginfo-2.1.7-2.rhaos4.13.el8.ppc64le.rpm
conmon-debugsource-2.1.7-2.rhaos4.13.el8.ppc64le.rpm
containernetworking-plugins-1.0.1-7.rhaos4.13.el8.ppc64le.rpm
containernetworking-plugins-debuginfo-1.0.1-7.rhaos4.13.el8.ppc64le.rpm
containernetworking-plugins-debugsource-1.0.1-7.rhaos4.13.el8.ppc64le.rpm
cri-o-1.26.3-9.rhaos4.13.git994242a.el8.ppc64le.rpm
cri-o-debuginfo-1.26.3-9.rhaos4.13.git994242a.el8.ppc64le.rpm
cri-o-debugsource-1.26.3-9.rhaos4.13.git994242a.el8.ppc64le.rpm
openshift-hyperkube-4.13.0-202306072143.p0.g7d22122.assembly.stream.el8.ppc64le.rpm
podman-4.4.1-4.rhaos4.13.el8.ppc64le.rpm
podman-catatonit-4.4.1-4.rhaos4.13.el8.ppc64le.rpm
podman-catatonit-debuginfo-4.4.1-4.rhaos4.13.el8.ppc64le.rpm
podman-debuginfo-4.4.1-4.rhaos4.13.el8.ppc64le.rpm
podman-debugsource-4.4.1-4.rhaos4.13.el8.ppc64le.rpm
podman-gvproxy-4.4.1-4.rhaos4.13.el8.ppc64le.rpm
podman-gvproxy-debuginfo-4.4.1-4.rhaos4.13.el8.ppc64le.rpm
podman-plugins-4.4.1-4.rhaos4.13.el8.ppc64le.rpm
podman-plugins-debuginfo-4.4.1-4.rhaos4.13.el8.ppc64le.rpm
podman-remote-4.4.1-4.rhaos4.13.el8.ppc64le.rpm
podman-remote-debuginfo-4.4.1-4.rhaos4.13.el8.ppc64le.rpm
podman-tests-4.4.1-4.rhaos4.13.el8.ppc64le.rpm
runc-1.1.6-4.rhaos4.13.el8.ppc64le.rpm
runc-debuginfo-1.1.6-4.rhaos4.13.el8.ppc64le.rpm
runc-debugsource-1.1.6-4.rhaos4.13.el8.ppc64le.rpm
skopeo-1.11.2-2.rhaos4.13.el8.ppc64le.rpm
skopeo-tests-1.11.2-2.rhaos4.13.el8.ppc64le.rpm
s390x:
buildah-1.29.1-2.rhaos4.13.el8.s390x.rpm
buildah-debuginfo-1.29.1-2.rhaos4.13.el8.s390x.rpm
buildah-debugsource-1.29.1-2.rhaos4.13.el8.s390x.rpm
buildah-tests-1.29.1-2.rhaos4.13.el8.s390x.rpm
buildah-tests-debuginfo-1.29.1-2.rhaos4.13.el8.s390x.rpm
conmon-2.1.7-2.rhaos4.13.el8.s390x.rpm
conmon-debuginfo-2.1.7-2.rhaos4.13.el8.s390x.rpm
conmon-debugsource-2.1.7-2.rhaos4.13.el8.s390x.rpm
containernetworking-plugins-1.0.1-7.rhaos4.13.el8.s390x.rpm
containernetworking-plugins-debuginfo-1.0.1-7.rhaos4.13.el8.s390x.rpm
containernetworking-plugins-debugsource-1.0.1-7.rhaos4.13.el8.s390x.rpm
cri-o-1.26.3-9.rhaos4.13.git994242a.el8.s390x.rpm
cri-o-debuginfo-1.26.3-9.rhaos4.13.git994242a.el8.s390x.rpm
cri-o-debugsource-1.26.3-9.rhaos4.13.git994242a.el8.s390x.rpm
openshift-hyperkube-4.13.0-202306072143.p0.g7d22122.assembly.stream.el8.s390x.rpm
podman-4.4.1-4.rhaos4.13.el8.s390x.rpm
podman-catatonit-4.4.1-4.rhaos4.13.el8.s390x.rpm
podman-catatonit-debuginfo-4.4.1-4.rhaos4.13.el8.s390x.rpm
podman-debuginfo-4.4.1-4.rhaos4.13.el8.s390x.rpm
podman-debugsource-4.4.1-4.rhaos4.13.el8.s390x.rpm
podman-gvproxy-4.4.1-4.rhaos4.13.el8.s390x.rpm
podman-gvproxy-debuginfo-4.4.1-4.rhaos4.13.el8.s390x.rpm
podman-plugins-4.4.1-4.rhaos4.13.el8.s390x.rpm
podman-plugins-debuginfo-4.4.1-4.rhaos4.13.el8.s390x.rpm
podman-remote-4.4.1-4.rhaos4.13.el8.s390x.rpm
podman-remote-debuginfo-4.4.1-4.rhaos4.13.el8.s390x.rpm
podman-tests-4.4.1-4.rhaos4.13.el8.s390x.rpm
runc-1.1.6-4.rhaos4.13.el8.s390x.rpm
runc-debuginfo-1.1.6-4.rhaos4.13.el8.s390x.rpm
runc-debugsource-1.1.6-4.rhaos4.13.el8.s390x.rpm
skopeo-1.11.2-2.rhaos4.13.el8.s390x.rpm
skopeo-tests-1.11.2-2.rhaos4.13.el8.s390x.rpm
x86_64:
buildah-1.29.1-2.rhaos4.13.el8.x86_64.rpm
buildah-debuginfo-1.29.1-2.rhaos4.13.el8.x86_64.rpm
buildah-debugsource-1.29.1-2.rhaos4.13.el8.x86_64.rpm
buildah-tests-1.29.1-2.rhaos4.13.el8.x86_64.rpm
buildah-tests-debuginfo-1.29.1-2.rhaos4.13.el8.x86_64.rpm
conmon-2.1.7-2.rhaos4.13.el8.x86_64.rpm
conmon-debuginfo-2.1.7-2.rhaos4.13.el8.x86_64.rpm
conmon-debugsource-2.1.7-2.rhaos4.13.el8.x86_64.rpm
containernetworking-plugins-1.0.1-7.rhaos4.13.el8.x86_64.rpm
containernetworking-plugins-debuginfo-1.0.1-7.rhaos4.13.el8.x86_64.rpm
containernetworking-plugins-debugsource-1.0.1-7.rhaos4.13.el8.x86_64.rpm
cri-o-1.26.3-9.rhaos4.13.git994242a.el8.x86_64.rpm
cri-o-debuginfo-1.26.3-9.rhaos4.13.git994242a.el8.x86_64.rpm
cri-o-debugsource-1.26.3-9.rhaos4.13.git994242a.el8.x86_64.rpm
openshift-hyperkube-4.13.0-202306072143.p0.g7d22122.assembly.stream.el8.x86_64.rpm
podman-4.4.1-4.rhaos4.13.el8.x86_64.rpm
podman-catatonit-4.4.1-4.rhaos4.13.el8.x86_64.rpm
podman-catatonit-debuginfo-4.4.1-4.rhaos4.13.el8.x86_64.rpm
podman-debuginfo-4.4.1-4.rhaos4.13.el8.x86_64.rpm
podman-debugsource-4.4.1-4.rhaos4.13.el8.x86_64.rpm
podman-gvproxy-4.4.1-4.rhaos4.13.el8.x86_64.rpm
podman-gvproxy-debuginfo-4.4.1-4.rhaos4.13.el8.x86_64.rpm
podman-plugins-4.4.1-4.rhaos4.13.el8.x86_64.rpm
podman-plugins-debuginfo-4.4.1-4.rhaos4.13.el8.x86_64.rpm
podman-remote-4.4.1-4.rhaos4.13.el8.x86_64.rpm
podman-remote-debuginfo-4.4.1-4.rhaos4.13.el8.x86_64.rpm
podman-tests-4.4.1-4.rhaos4.13.el8.x86_64.rpm
runc-1.1.6-4.rhaos4.13.el8.x86_64.rpm
runc-debuginfo-1.1.6-4.rhaos4.13.el8.x86_64.rpm
runc-debugsource-1.1.6-4.rhaos4.13.el8.x86_64.rpm
skopeo-1.11.2-2.rhaos4.13.el8.x86_64.rpm
skopeo-tests-1.11.2-2.rhaos4.13.el8.x86_64.rpm
Red Hat OpenShift Container Platform 4.13:
Source:
buildah-1.29.1-2.1.rhaos4.13.el9.src.rpm
conmon-2.1.7-2.1.rhaos4.13.el9.src.rpm
cri-o-1.26.3-10.rhaos4.13.git994242a.el9.src.rpm
kernel-5.14.0-284.18.1.el9_2.src.rpm
kernel-rt-5.14.0-284.18.1.rt14.303.el9_2.src.rpm
openshift-4.13.0-202306072143.p0.g7d22122.assembly.stream.el9.src.rpm
podman-4.4.1-5.1.rhaos4.13.el9.src.rpm
skopeo-1.11.2-2.1.rhaos4.13.el9.src.rpm
aarch64:
bpftool-7.0.0-284.18.1.el9_2.aarch64.rpm
bpftool-debuginfo-7.0.0-284.18.1.el9_2.aarch64.rpm
buildah-1.29.1-2.1.rhaos4.13.el9.aarch64.rpm
buildah-debuginfo-1.29.1-2.1.rhaos4.13.el9.aarch64.rpm
buildah-debugsource-1.29.1-2.1.rhaos4.13.el9.aarch64.rpm
buildah-tests-1.29.1-2.1.rhaos4.13.el9.aarch64.rpm
buildah-tests-debuginfo-1.29.1-2.1.rhaos4.13.el9.aarch64.rpm
conmon-2.1.7-2.1.rhaos4.13.el9.aarch64.rpm
conmon-debuginfo-2.1.7-2.1.rhaos4.13.el9.aarch64.rpm
conmon-debugsource-2.1.7-2.1.rhaos4.13.el9.aarch64.rpm
cri-o-1.26.3-10.rhaos4.13.git994242a.el9.aarch64.rpm
cri-o-debuginfo-1.26.3-10.rhaos4.13.git994242a.el9.aarch64.rpm
cri-o-debugsource-1.26.3-10.rhaos4.13.git994242a.el9.aarch64.rpm
kernel-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-devel-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-devel-matched-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-extra-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-internal-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debug-modules-partner-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-devel-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-devel-matched-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-modules-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-modules-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-modules-extra-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-modules-internal-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-64k-modules-partner-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-cross-headers-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-devel-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-modules-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-modules-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-modules-internal-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debug-modules-partner-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-debuginfo-common-aarch64-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-devel-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-devel-matched-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-headers-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-modules-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-modules-core-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-modules-extra-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-modules-internal-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-modules-partner-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-selftests-internal-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-tools-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-tools-libs-5.14.0-284.18.1.el9_2.aarch64.rpm
kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.aarch64.rpm
openshift-hyperkube-4.13.0-202306072143.p0.g7d22122.assembly.stream.el9.aarch64.rpm
perf-5.14.0-284.18.1.el9_2.aarch64.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
podman-4.4.1-5.1.rhaos4.13.el9.aarch64.rpm
podman-debuginfo-4.4.1-5.1.rhaos4.13.el9.aarch64.rpm
podman-debugsource-4.4.1-5.1.rhaos4.13.el9.aarch64.rpm
podman-gvproxy-4.4.1-5.1.rhaos4.13.el9.aarch64.rpm
podman-gvproxy-debuginfo-4.4.1-5.1.rhaos4.13.el9.aarch64.rpm
podman-plugins-4.4.1-5.1.rhaos4.13.el9.aarch64.rpm
podman-plugins-debuginfo-4.4.1-5.1.rhaos4.13.el9.aarch64.rpm
podman-remote-4.4.1-5.1.rhaos4.13.el9.aarch64.rpm
podman-remote-debuginfo-4.4.1-5.1.rhaos4.13.el9.aarch64.rpm
podman-tests-4.4.1-5.1.rhaos4.13.el9.aarch64.rpm
python3-perf-5.14.0-284.18.1.el9_2.aarch64.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.aarch64.rpm
rtla-5.14.0-284.18.1.el9_2.aarch64.rpm
skopeo-1.11.2-2.1.rhaos4.13.el9.aarch64.rpm
skopeo-debuginfo-1.11.2-2.1.rhaos4.13.el9.aarch64.rpm
skopeo-debugsource-1.11.2-2.1.rhaos4.13.el9.aarch64.rpm
skopeo-tests-1.11.2-2.1.rhaos4.13.el9.aarch64.rpm
noarch:
kernel-abi-stablelists-5.14.0-284.18.1.el9_2.noarch.rpm
kernel-doc-5.14.0-284.18.1.el9_2.noarch.rpm
podman-docker-4.4.1-5.1.rhaos4.13.el9.noarch.rpm
ppc64le:
bpftool-7.0.0-284.18.1.el9_2.ppc64le.rpm
bpftool-debuginfo-7.0.0-284.18.1.el9_2.ppc64le.rpm
buildah-1.29.1-2.1.rhaos4.13.el9.ppc64le.rpm
buildah-debuginfo-1.29.1-2.1.rhaos4.13.el9.ppc64le.rpm
buildah-debugsource-1.29.1-2.1.rhaos4.13.el9.ppc64le.rpm
buildah-tests-1.29.1-2.1.rhaos4.13.el9.ppc64le.rpm
buildah-tests-debuginfo-1.29.1-2.1.rhaos4.13.el9.ppc64le.rpm
conmon-2.1.7-2.1.rhaos4.13.el9.ppc64le.rpm
conmon-debuginfo-2.1.7-2.1.rhaos4.13.el9.ppc64le.rpm
conmon-debugsource-2.1.7-2.1.rhaos4.13.el9.ppc64le.rpm
cri-o-1.26.3-10.rhaos4.13.git994242a.el9.ppc64le.rpm
cri-o-debuginfo-1.26.3-10.rhaos4.13.git994242a.el9.ppc64le.rpm
cri-o-debugsource-1.26.3-10.rhaos4.13.git994242a.el9.ppc64le.rpm
kernel-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-core-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-cross-headers-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-core-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-devel-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-modules-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-modules-core-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-modules-internal-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debug-modules-partner-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-debuginfo-common-ppc64le-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-devel-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-devel-matched-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-headers-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-ipaclones-internal-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-modules-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-modules-core-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-modules-extra-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-modules-internal-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-modules-partner-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-selftests-internal-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-tools-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-tools-libs-5.14.0-284.18.1.el9_2.ppc64le.rpm
kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.ppc64le.rpm
openshift-hyperkube-4.13.0-202306072143.p0.g7d22122.assembly.stream.el9.ppc64le.rpm
perf-5.14.0-284.18.1.el9_2.ppc64le.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
podman-4.4.1-5.1.rhaos4.13.el9.ppc64le.rpm
podman-debuginfo-4.4.1-5.1.rhaos4.13.el9.ppc64le.rpm
podman-debugsource-4.4.1-5.1.rhaos4.13.el9.ppc64le.rpm
podman-gvproxy-4.4.1-5.1.rhaos4.13.el9.ppc64le.rpm
podman-gvproxy-debuginfo-4.4.1-5.1.rhaos4.13.el9.ppc64le.rpm
podman-plugins-4.4.1-5.1.rhaos4.13.el9.ppc64le.rpm
podman-plugins-debuginfo-4.4.1-5.1.rhaos4.13.el9.ppc64le.rpm
podman-remote-4.4.1-5.1.rhaos4.13.el9.ppc64le.rpm
podman-remote-debuginfo-4.4.1-5.1.rhaos4.13.el9.ppc64le.rpm
podman-tests-4.4.1-5.1.rhaos4.13.el9.ppc64le.rpm
python3-perf-5.14.0-284.18.1.el9_2.ppc64le.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.ppc64le.rpm
rtla-5.14.0-284.18.1.el9_2.ppc64le.rpm
skopeo-1.11.2-2.1.rhaos4.13.el9.ppc64le.rpm
skopeo-debuginfo-1.11.2-2.1.rhaos4.13.el9.ppc64le.rpm
skopeo-debugsource-1.11.2-2.1.rhaos4.13.el9.ppc64le.rpm
skopeo-tests-1.11.2-2.1.rhaos4.13.el9.ppc64le.rpm
s390x:
bpftool-7.0.0-284.18.1.el9_2.s390x.rpm
bpftool-debuginfo-7.0.0-284.18.1.el9_2.s390x.rpm
buildah-1.29.1-2.1.rhaos4.13.el9.s390x.rpm
buildah-debuginfo-1.29.1-2.1.rhaos4.13.el9.s390x.rpm
buildah-debugsource-1.29.1-2.1.rhaos4.13.el9.s390x.rpm
buildah-tests-1.29.1-2.1.rhaos4.13.el9.s390x.rpm
buildah-tests-debuginfo-1.29.1-2.1.rhaos4.13.el9.s390x.rpm
conmon-2.1.7-2.1.rhaos4.13.el9.s390x.rpm
conmon-debuginfo-2.1.7-2.1.rhaos4.13.el9.s390x.rpm
conmon-debugsource-2.1.7-2.1.rhaos4.13.el9.s390x.rpm
cri-o-1.26.3-10.rhaos4.13.git994242a.el9.s390x.rpm
cri-o-debuginfo-1.26.3-10.rhaos4.13.git994242a.el9.s390x.rpm
cri-o-debugsource-1.26.3-10.rhaos4.13.git994242a.el9.s390x.rpm
kernel-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-core-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-cross-headers-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-core-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-devel-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-modules-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-modules-core-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-modules-internal-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debug-modules-partner-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-debuginfo-common-s390x-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-devel-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-devel-matched-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-headers-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-modules-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-modules-core-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-modules-extra-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-modules-internal-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-modules-partner-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-selftests-internal-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-tools-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-core-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-devel-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-devel-matched-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-core-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-extra-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-internal-5.14.0-284.18.1.el9_2.s390x.rpm
kernel-zfcpdump-modules-partner-5.14.0-284.18.1.el9_2.s390x.rpm
openshift-hyperkube-4.13.0-202306072143.p0.g7d22122.assembly.stream.el9.s390x.rpm
perf-5.14.0-284.18.1.el9_2.s390x.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
podman-4.4.1-5.1.rhaos4.13.el9.s390x.rpm
podman-debuginfo-4.4.1-5.1.rhaos4.13.el9.s390x.rpm
podman-debugsource-4.4.1-5.1.rhaos4.13.el9.s390x.rpm
podman-gvproxy-4.4.1-5.1.rhaos4.13.el9.s390x.rpm
podman-gvproxy-debuginfo-4.4.1-5.1.rhaos4.13.el9.s390x.rpm
podman-plugins-4.4.1-5.1.rhaos4.13.el9.s390x.rpm
podman-plugins-debuginfo-4.4.1-5.1.rhaos4.13.el9.s390x.rpm
podman-remote-4.4.1-5.1.rhaos4.13.el9.s390x.rpm
podman-remote-debuginfo-4.4.1-5.1.rhaos4.13.el9.s390x.rpm
podman-tests-4.4.1-5.1.rhaos4.13.el9.s390x.rpm
python3-perf-5.14.0-284.18.1.el9_2.s390x.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.s390x.rpm
rtla-5.14.0-284.18.1.el9_2.s390x.rpm
skopeo-1.11.2-2.1.rhaos4.13.el9.s390x.rpm
skopeo-debuginfo-1.11.2-2.1.rhaos4.13.el9.s390x.rpm
skopeo-debugsource-1.11.2-2.1.rhaos4.13.el9.s390x.rpm
skopeo-tests-1.11.2-2.1.rhaos4.13.el9.s390x.rpm
x86_64:
bpftool-7.0.0-284.18.1.el9_2.x86_64.rpm
bpftool-debuginfo-7.0.0-284.18.1.el9_2.x86_64.rpm
buildah-1.29.1-2.1.rhaos4.13.el9.x86_64.rpm
buildah-debuginfo-1.29.1-2.1.rhaos4.13.el9.x86_64.rpm
buildah-debugsource-1.29.1-2.1.rhaos4.13.el9.x86_64.rpm
buildah-tests-1.29.1-2.1.rhaos4.13.el9.x86_64.rpm
buildah-tests-debuginfo-1.29.1-2.1.rhaos4.13.el9.x86_64.rpm
conmon-2.1.7-2.1.rhaos4.13.el9.x86_64.rpm
conmon-debuginfo-2.1.7-2.1.rhaos4.13.el9.x86_64.rpm
conmon-debugsource-2.1.7-2.1.rhaos4.13.el9.x86_64.rpm
cri-o-1.26.3-10.rhaos4.13.git994242a.el9.x86_64.rpm
cri-o-debuginfo-1.26.3-10.rhaos4.13.git994242a.el9.x86_64.rpm
cri-o-debugsource-1.26.3-10.rhaos4.13.git994242a.el9.x86_64.rpm
kernel-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-core-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-cross-headers-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-core-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-devel-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-modules-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-modules-internal-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-modules-partner-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debug-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-debuginfo-common-x86_64-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-devel-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-headers-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-ipaclones-internal-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-modules-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-modules-core-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-modules-extra-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-modules-internal-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-modules-partner-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-rt-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-core-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-debug-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-debug-core-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-debug-debuginfo-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-debug-devel-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-debug-devel-matched-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-debug-kvm-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-debug-modules-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-debug-modules-core-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-debug-modules-extra-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-debug-modules-internal-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-debug-modules-partner-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-debuginfo-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-debuginfo-common-x86_64-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-devel-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-devel-matched-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-kvm-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-modules-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-modules-core-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-modules-extra-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-modules-internal-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-modules-partner-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-rt-selftests-internal-5.14.0-284.18.1.rt14.303.el9_2.x86_64.rpm
kernel-selftests-internal-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-tools-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-tools-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-tools-libs-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-tools-libs-devel-5.14.0-284.18.1.el9_2.x86_64.rpm
kernel-uki-virt-5.14.0-284.18.1.el9_2.x86_64.rpm
openshift-hyperkube-4.13.0-202306072143.p0.g7d22122.assembly.stream.el9.x86_64.rpm
perf-5.14.0-284.18.1.el9_2.x86_64.rpm
perf-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
podman-4.4.1-5.1.rhaos4.13.el9.x86_64.rpm
podman-debuginfo-4.4.1-5.1.rhaos4.13.el9.x86_64.rpm
podman-debugsource-4.4.1-5.1.rhaos4.13.el9.x86_64.rpm
podman-gvproxy-4.4.1-5.1.rhaos4.13.el9.x86_64.rpm
podman-gvproxy-debuginfo-4.4.1-5.1.rhaos4.13.el9.x86_64.rpm
podman-plugins-4.4.1-5.1.rhaos4.13.el9.x86_64.rpm
podman-plugins-debuginfo-4.4.1-5.1.rhaos4.13.el9.x86_64.rpm
podman-remote-4.4.1-5.1.rhaos4.13.el9.x86_64.rpm
podman-remote-debuginfo-4.4.1-5.1.rhaos4.13.el9.x86_64.rpm
podman-tests-4.4.1-5.1.rhaos4.13.el9.x86_64.rpm
python3-perf-5.14.0-284.18.1.el9_2.x86_64.rpm
python3-perf-debuginfo-5.14.0-284.18.1.el9_2.x86_64.rpm
rtla-5.14.0-284.18.1.el9_2.x86_64.rpm
skopeo-1.11.2-2.1.rhaos4.13.el9.x86_64.rpm
skopeo-debuginfo-1.11.2-2.1.rhaos4.13.el9.x86_64.rpm
skopeo-debugsource-1.11.2-2.1.rhaos4.13.el9.x86_64.rpm
skopeo-tests-1.11.2-2.1.rhaos4.13.el9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2022-41717
https://access.redhat.com/security/cve/CVE-2022-41724
https://access.redhat.com/security/cve/CVE-2022-41725
https://access.redhat.com/security/cve/CVE-2023-24534
https://access.redhat.com/security/cve/CVE-2023-24536
https://access.redhat.com/security/cve/CVE-2023-24537
https://access.redhat.com/security/cve/CVE-2023-24538
https://access.redhat.com/security/cve/CVE-2023-24540
https://access.redhat.com/security/cve/CVE-2023-27561
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/articles/11258
- Contact:
The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=iMcG
-----END PGP SIGNATURE-----
–
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Related news
Gentoo Linux Security Advisory 202408-25 - Multiple vulnerabilities have been discovered in runc, the worst of which could lead to privilege escalation. Versions greater than or equal to 1.1.12 are affected.
Red Hat Security Advisory 2024-0746-03 - Updated container image for Red Hat Ceph Storage 5.3 is now available in the Red Hat Ecosystem Catalog. Issues addressed include cross site scripting and denial of service vulnerabilities.
Red Hat Security Advisory 2023-7672-03 - Red Hat OpenShift Virtualization release 4.14.1 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-5964-01 - An update for collectd-libpod-stats is now available for Red Hat OpenStack Platform 16.2.5. Issues addressed include a denial of service vulnerability.
Red Hat Advanced Cluster Management for Kubernetes 2.8.2 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41721: A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead read the body of the HTTP request, which could be att...
Docker Desktop before 4.23.0 allows Access Token theft via a crafted extension icon URL. This issue affects Docker Desktop: before 4.23.0.
Docker Desktop before 4.12.0 is vulnerable to RCE via a crafted extension description or changelog. This issue affects Docker Desktop: before 4.12.0.
Updated Red Hat OpenShift Distributed Tracing 2.9 container images are now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial...
Red Hat Security Advisory 2023-4657-01 - Secondary Scheduler Operator for Red Hat OpenShift 1.1.2. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-4664-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.13.3 images. Issues addressed include a denial of service vulnerability.
Red Hat OpenShift Virtualization release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Con...
Migration Toolkit for Applications 6.2.0 release Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46877: A flaw was found in Jackson Databind. This issue may allow a malicious user to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization. * CVE-2022-4492: A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a...
cert-manager Operator for Red Hat OpenShift 1.10.3 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specia...
An update is now available for Red Hat Ansible Automation Platform 2.3 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys ca...
Red Hat Security Advisory 2023-4289-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes.
Red Hat OpenShift Container Platform release 4.13.6 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number...
Red Hat OpenShift Container Platform release 4.13.6 is now available with updates to packages and images that fix several bugs. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.
Red Hat Security Advisory 2023-4093-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.5. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-4091-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.5. Issues addressed include a denial of service vulnerability.
Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-1260: An authentication bypass vulnerability was discovered in kube-apiserver. This issue could allow a remote, authenticated attacker who has been given permissions "update, patch" the "po...
Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...
Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...
Red Hat Security Advisory 2023-4003-01 - As a Kubernetes user, I cannot connect easily connect services from one cluster with services on another cluster. Red Hat Application Interconnect enables me to create a service network and it allows geographically distributed services to connect as if they were all running in the same site. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3925-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.23.
Red Hat OpenShift Container Platform release 4.12.23 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-...
Red Hat Security Advisory 2023-3910-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.63.
Red Hat OpenShift Container Platform release 4.11.44 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS...
Updated images are now available for Red Hat Advanced Cluster Security (RHACS). The updated image includes new features and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms based on SHA-2, enabling an attacker to crash the server, resulting in a loss of availability. * CVE...
OpenShift API for Data Protection (OADP) 1.1.5 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in H...
Red Hat Security Advisory 2023-3742-02 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. Issues addressed include bypass, denial of service, and remote SQL injection vulnerabilities.
Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.
Dell VxRail, version(s) 8.0.100 and earlier contain a denial-of-service vulnerability in the upgrade functionality. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to degraded performance and system malfunction.
Red Hat Security Advisory 2023-3624-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3624-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3624-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3624-01 - The Migration Toolkit for Containers enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API. Issues addressed include a denial of service vulnerability.
Red Hat OpenShift Service Mesh Containers for 2.4.0 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.
Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3540-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.3. Issues addressed include a denial of service vulnerability.
The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...
The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...
The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...
The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...
The Migration Toolkit for Containers (MTC) 1.7.10 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A flaw was found in Golang Go, where it is vulnerable to a denial of service cause...
Red Hat OpenShift Container Platform release 4.11.43 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: A flaw was found in golang. The language package for go language can panic due to an out-of-bounds read when an incorrectly formatted language tag is being parsed. This flaw allows a...
Red Hat OpenShift Container Platform release 4.12.21 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24540: A flaw was found in golang, where not all valid JavaScript white-space characters were considered white space. Due to this issue, templates containing white-space characters outside ...
Red Hat OpenShift Container Platform release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A ...
Red Hat OpenShift Container Platform release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A ...
Red Hat OpenShift Container Platform release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A ...
Red Hat OpenShift Container Platform release 4.13.3 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24534: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by memory exhaustion in the common function in HTTP and MIME header parsing. By sending a specially crafted request, a remote attacker can cause a denial of service. * CVE-2023-24536: A ...
Red Hat Security Advisory 2023-3366-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.2. Issues addressed include a traversal vulnerability.
Red Hat Security Advisory 2023-3366-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.2. Issues addressed include a traversal vulnerability.
Red Hat OpenShift Container Platform release 4.13.2 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms...
OpenShift Serverless version 1.29.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker ...
OpenShift Serverless version 1.29.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker ...
OpenShift Serverless version 1.29.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker ...
OpenShift Serverless version 1.29.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker ...
An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...
An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...
An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...
An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...
An update for etcd is now available for Red Hat OpenStack Platform 16.2 (Train). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-28235: A flaw was found in etcd, where etc-io could allow a remote attacker to gain elevated privileges on the system caused by a vulnerability in the debug function. By sending a specially crafted request, an attacker can gain elevated privileges. * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause e...
Red Hat Security Advisory 2023-3303-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.1.
OpenShift Serverless 1.29.0 has been released. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of serv...
An update is now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24539: A flaw was found in golang where angle brackets (<>) were not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character could result in unexpectedly closing the CSS context and allowing for the injection of unexpected HMTL if executed with untrusted inpu...
Red Hat OpenShift Container Platform release 4.13.1 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a ...
Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Red Hat Security Advisory 2023-3323-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang.
Red Hat Security Advisory 2023-3318-01 - Go Toolset provides the Go programming language tools and libraries. Go is alternatively known as golang. The golang packages provide the Go programming language compiler.
An update for go-toolset-1.19 and go-toolset-1.19-golang is now available for Red Hat Developer Tools. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24537: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service. * CVE-2023-24538: A flaw was found in Golang Go. This flaw ...
An update for go-toolset-1.19 and go-toolset-1.19-golang is now available for Red Hat Developer Tools. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24537: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused by an infinite loop due to integer overflow when calling any of the Parse functions. By sending a specially crafted input, a remote attacker can cause a denial of service. * CVE-2023-24538: A flaw was found in Golang Go. This flaw ...
Red Hat Security Advisory 2023-3167-01 - New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images have been released, adding a variety of features and bug fixes. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-3167-01 - New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images have been released, adding a variety of features and bug fixes. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-0584-01 - Secondary Scheduler Operator for Red Hat OpenShift 1.1.1. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-0584-01 - Secondary Scheduler Operator for Red Hat OpenShift 1.1.1. Issues addressed include a denial of service vulnerability.
Ubuntu Security Notice 6088-1 - It was discovered that runC incorrectly made /sys/fs/cgroup writable when in rootless mode. An attacker could possibly use this issue to escalate privileges. It was discovered that runC incorrectly performed access control when mounting /proc to non-directories. An attacker could possibly use this issue to escalate privileges. It was discovered that runC incorrectly handled /proc and /sys mounts inside a container. An attacker could possibly use this issue to bypass AppArmor, and potentially SELinux.
Red Hat Security Advisory 2023-1329-01 - Red Hat build of MicroShift is Red Hat's light-weight Kubernetes orchestration solution designed for edge device deployments and is built from the edge capabilities of Red Hat OpenShift. MicroShift is an application that is deployed on top of Red Hat Enterprise Linux devices at the edge, providing an efficient way to operate single-node clusters in these low-resource environments. This advisory contains the RPM packages for Red Hat build of MicroShift 4.13.0. Issues addressed include a man-in-the-middle vulnerability.
Red Hat Security Advisory 2023-1326-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, information leakage, out of bounds read, and remote SQL injection vulnerabilities.
Red Hat Security Advisory 2023-1326-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, information leakage, out of bounds read, and remote SQL injection vulnerabilities.
Red Hat Security Advisory 2023-1326-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, information leakage, out of bounds read, and remote SQL injection vulnerabilities.
Red Hat Security Advisory 2023-1326-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.0. Issues addressed include bypass, denial of service, information leakage, out of bounds read, and remote SQL injection vulnerabilities.
New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images are now availableThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption...
New Red Hat build of Cryostat 2.3.0 on RHEL 8 container images are now availableThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by an excessive resource consumption...
Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...
Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...
Red Hat OpenShift Container Platform release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4235: A flaw was found in go-yaml. This issue occurs due to unbounded alias chasing, where a maliciously crafted YAML file can cause the system to consume significant system resources. If p...
An update for conmon is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can ...
Red Hat Security Advisory 2023-2107-01 - The Migration Toolkit for Containers (MTC) 1.7.9 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-2107-01 - The Migration Toolkit for Containers (MTC) 1.7.9 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. Issues addressed include a denial of service vulnerability.
The Migration Toolkit for Containers (MTC) 1.7.9 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by...
Ubuntu Security Notice 6038-1 - It was discovered that the Go net/http module incorrectly handled Transfer-Encoding headers in the HTTP/1 client. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack. It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting into a denial of service.
Ubuntu Security Notice 6038-1 - It was discovered that the Go net/http module incorrectly handled Transfer-Encoding headers in the HTTP/1 client. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack. It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting into a denial of service.
Ubuntu Security Notice 6038-1 - It was discovered that the Go net/http module incorrectly handled Transfer-Encoding headers in the HTTP/1 client. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack. It was discovered that Go did not properly manage memory under certain circumstances. An attacker could possibly use this issue to cause a panic resulting into a denial of service.
Red Hat Security Advisory 2023-1817-01 - Network Observability 1.2.0 is an OpenShift operator that provides a monitoring pipeline to collect and enrich network flows that are produced by the Network observability eBPF agent. The operator provides dashboards, metrics, and keeps flows accessible in a queryable log store, Grafana Loki. When a FlowCollector is deployed, new dashboards are available in the Console. This update contains bug fixes. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-1817-01 - Network Observability 1.2.0 is an OpenShift operator that provides a monitoring pipeline to collect and enrich network flows that are produced by the Network observability eBPF agent. The operator provides dashboards, metrics, and keeps flows accessible in a queryable log store, Grafana Loki. When a FlowCollector is deployed, new dashboards are available in the Console. This update contains bug fixes. Issues addressed include a denial of service vulnerability.
Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinte...
HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. With fix, header parsing now correctly allocates only the memory required to hold parsed headers.
Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow.
Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intended. 2. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts. 3. ReadForm can allocate a large number of short-lived buffers, further increasing pressure on the garbage collector. The combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of CPU and memory, potentially resulting in a denial of service. This affects programs that use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMul...
Red Hat Security Advisory 2023-1639-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-1639-01 - OpenShift API for Data Protection enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Issues addressed include a denial of service vulnerability.
OpenShift API for Data Protection (OADP) 1.1.3 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by a...
OpenShift API for Data Protection (OADP) 1.1.3 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41724: A flaw was found in Golang Go, where it is vulnerable to a denial of service caused when processing large TLS handshake records. By sending specially-crafted TLS handshake records, a remote, authenticated attacker can cause a denial of service condition. * CVE-2022-41725: A flaw was found in Go, where it is vulnerable to a denial of service caused by a...
runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.
Red Hat Security Advisory 2023-1276-01 - Collectd plugin for gathering resource usage statistics from containers created with the libpod library.
An update for collectd-libpod-stats is now available for Red Hat OpenStack Platform. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very ...
Red Hat Security Advisory 2023-1179-01 - Red Hat OpenShift Serverless Client kn 1.27.1 provides a CLI to interact with Red Hat OpenShift Serverless 1.27.1. The kn CLI is delivered as an RPM package for installation on RHEL platforms, and as binaries for non-Linux platforms. This release includes security and bug fixes, and enhancements.
OpenShift Serverless version 1.27.1 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability. Ratings are based on a Common Vulnerability Scoring System (CVSS) base score.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.
runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).
A denial of service is possible from excessive resource consumption in net/http and mime/multipart. Multipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory and disk files. This also affects form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. ReadForm takes a maxMemory parameter, and is documented as storing "up to maxMemory bytes +10MB (reserved for non-file parts) in memory". File parts which cannot be stored in memory are stored on disk in temporary files. The unconfigurable 10MB reserved for non-file parts is excessively large and can potentially open a denial of service vector on its own. However, ReadForm did not properly account for all memory consumed by a parsed form, such as map entry overhead, part names, and MIME headers, permitting a maliciously crafted form to consume well over 10MB. In addition, ReadForm contained no limit on the number of disk files cr...
Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth >= RequestClientCert).
Red Hat Security Advisory 2023-0728-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.3.
Red Hat OpenShift Container Platform release 4.12.3 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.12. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric...
Red Hat Security Advisory 2023-0632-01 - Logging Subsystem 5.4.11 - Red Hat OpenShift.
Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. Users are advised to upgrade to version 2.9.6. Users unable to upgrade should check their logs to detect the error messages and fix your TLS options.
runc through 1.0.0-rc9 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. (This vulnerability does not affect Docker due to an implementation detail that happens to block the attack.)