Headline
RHSA-2023:0697: Red Hat Security Advisory: OpenShift Container Platform 4.10.52 security update
Red Hat OpenShift Container Platform release 4.10.52 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-1471: A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).
- CVE-2022-34174: In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Jenkins user database security realm.
Synopsis
Important: OpenShift Container Platform 4.10.52 security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
Red Hat OpenShift Container Platform release 4.10.52 is now available with updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.52. See the following advisory for the container images for this release:
https://access.redhat.com/errata/RHSA-2023:0698
Security Fix(es):
- SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)
- jenkins: Observable timing discrepancy allows determining username validity (CVE-2022-34174)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
All OpenShift Container Platform 4.10 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html
Affected Products
- Red Hat OpenShift Container Platform 4.10 for RHEL 8 x86_64
- Red Hat OpenShift Container Platform 4.10 for RHEL 7 x86_64
- Red Hat OpenShift Container Platform for Power 4.10 for RHEL 8 ppc64le
- Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.10 for RHEL 8 s390x
- Red Hat OpenShift Container Platform for ARM 64 4.10 aarch64
Fixes
- BZ - 2119653 - CVE-2022-34174 jenkins: Observable timing discrepancy allows determining username validity
- BZ - 2150009 - CVE-2022-1471 SnakeYaml: Constructor Deserialization Remote Code Execution
Red Hat OpenShift Container Platform 4.10 for RHEL 8
SRPM
atomic-openshift-service-idler-4.10.0-202302072053.p0.ga0f9090.assembly.stream.el8.src.rpm
SHA-256: e7f07ac77ecf83bfa0c28671a799495d19f4a9640ae3923c41cbbf1c99ef6823
jenkins-2-plugins-4.10.1675407676-1.el8.src.rpm
SHA-256: 6526b0c5518b5c3eef3ba1702e7f7e3f5e839c054fdfb8b1b2f649ab26f1fb8d
jenkins-2.361.1.1675406172-1.el8.src.rpm
SHA-256: 37d741269009af497cdff9a7c2f573f1c7ce89ce361950fdbe28da3f0cf72386
openshift-4.10.0-202302072053.p0.g8a6bfe4.assembly.stream.el8.src.rpm
SHA-256: a76335af41c312e6f116166dcd34afaa453ca7d78617a2aea0ead38f72ce8965
openshift-ansible-4.10.0-202302072053.p0.g72c7be6.assembly.stream.el8.src.rpm
SHA-256: b1b72b09070bf66647f617ac97575498cab5510c1de2468c5ffe4e8a9a4e1ce0
openshift-clients-4.10.0-202302072053.p0.gdaed147.assembly.stream.el8.src.rpm
SHA-256: 62e597b45564d6d10af35bc0dbc6d43346ecf7f863816d7f8d13e46d00be81ee
openshift-kuryr-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.src.rpm
SHA-256: eb0f62fe61851e231e33eb88e70bfb22aa617bf373fd1bceb464692493ee7f25
python-sushy-4.1.5-0.20221125154417.ff95176.el8.src.rpm
SHA-256: 29b80c5f8b4dac6c116a96bc6257c805aad4555f95462a273501604eeac62304
x86_64
atomic-openshift-service-idler-4.10.0-202302072053.p0.ga0f9090.assembly.stream.el8.x86_64.rpm
SHA-256: 05e3e31ff592b7a23a2e9e29e541481412f31ee2a2fc0e0a246b2fb5cb2cbf65
jenkins-2-plugins-4.10.1675407676-1.el8.noarch.rpm
SHA-256: 3a638e5084f04e1b17f0bcb262244e957e2bbafe988523d430a8aa46060d4f70
jenkins-2.361.1.1675406172-1.el8.noarch.rpm
SHA-256: 9c673187393eee2292940169de6fca8a6a0385e673b39892bde456ec85b43af3
openshift-ansible-4.10.0-202302072053.p0.g72c7be6.assembly.stream.el8.noarch.rpm
SHA-256: b15d0458bf495d48534cae7312ab1969472ff21aece8d4de96e5192268442bf0
openshift-ansible-test-4.10.0-202302072053.p0.g72c7be6.assembly.stream.el8.noarch.rpm
SHA-256: 7cef2bb4cc217273410de5e43d626e4df0a8e562b161fcb14166727f93814b14
openshift-clients-4.10.0-202302072053.p0.gdaed147.assembly.stream.el8.x86_64.rpm
SHA-256: de483ffe1716b0a276e1a5c08655223ce54d64e4ed612d381b3eff69c6eaf1f7
openshift-clients-redistributable-4.10.0-202302072053.p0.gdaed147.assembly.stream.el8.x86_64.rpm
SHA-256: 25a87a1b25f58b6cbce4642dcb6ec4cdc7d6dca3d23db3314a6f9de69200cdfb
openshift-hyperkube-4.10.0-202302072053.p0.g8a6bfe4.assembly.stream.el8.x86_64.rpm
SHA-256: b186f3845ff6c1883b1f809a5e55822b305552d766573d844aa4e318ca16360c
openshift-kuryr-cni-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: 06f0a9824bc6346013d505d2bfb6d8e591a0d48247a42c2b62d5d3e324e966b7
openshift-kuryr-common-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: 1986161d3debb48190368c93522fd3e2ab691da9b9385f9dad75e849d00df259
openshift-kuryr-controller-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: fceaf590f56573cda39614cb9353649a038845ef4e29cccbed7e959e9865e880
python3-kuryr-kubernetes-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: 771495206f93f86b67a387044ca3d59b1779b56c688508f0177253cec6debb64
python3-sushy-4.1.5-0.20221125154417.ff95176.el8.noarch.rpm
SHA-256: 2e405642605fc76826aeff50f292d895dbdc8357a4e541ba0151e3e029cf36e2
python3-sushy-tests-4.1.5-0.20221125154417.ff95176.el8.noarch.rpm
SHA-256: 899bb7ce13cb2b98d17cfa64a90f75c671aef8457e42359b288534b34dd85667
Red Hat OpenShift Container Platform 4.10 for RHEL 7
SRPM
openshift-4.10.0-202302072053.p0.g8a6bfe4.assembly.stream.el7.src.rpm
SHA-256: 02d36d1281d64cd456a78e33b8d3876f271a53747edcfe7f3536f9ca168aad1f
openshift-ansible-4.10.0-202302072053.p0.g72c7be6.assembly.stream.el7.src.rpm
SHA-256: 7257d71869ab228de3217982f3d4a44c6f95efb08b45b7106bd950f858606925
openshift-clients-4.10.0-202302072053.p0.gdaed147.assembly.stream.el7.src.rpm
SHA-256: e091151051c176b68b5ce33bc554653dbd4fa847960d888190bfa1c9e83af021
x86_64
openshift-ansible-4.10.0-202302072053.p0.g72c7be6.assembly.stream.el7.noarch.rpm
SHA-256: aad7ca072a2df4eaa55d045aeebdedff14f3cb56e417e0be755de8dabe607c49
openshift-ansible-test-4.10.0-202302072053.p0.g72c7be6.assembly.stream.el7.noarch.rpm
SHA-256: 844fb1651d4844706b4f6eddac4a06a744ea6aaadad67781ba296890294345b8
openshift-clients-4.10.0-202302072053.p0.gdaed147.assembly.stream.el7.x86_64.rpm
SHA-256: c9cdfec517a9da45c2f9959e1ffa9aa421a80e017e329935481a56752dfd2665
openshift-clients-redistributable-4.10.0-202302072053.p0.gdaed147.assembly.stream.el7.x86_64.rpm
SHA-256: 4827f2867345a66f6bb4965827ea4540c1b264f5545681a0769c1b1931af2efa
openshift-hyperkube-4.10.0-202302072053.p0.g8a6bfe4.assembly.stream.el7.x86_64.rpm
SHA-256: b0ef394515e4e12e6c5b57999bdd034802ed4af4c51c0e9c70f662a39cefebcf
Red Hat OpenShift Container Platform for Power 4.10 for RHEL 8
SRPM
atomic-openshift-service-idler-4.10.0-202302072053.p0.ga0f9090.assembly.stream.el8.src.rpm
SHA-256: e7f07ac77ecf83bfa0c28671a799495d19f4a9640ae3923c41cbbf1c99ef6823
jenkins-2-plugins-4.10.1675407676-1.el8.src.rpm
SHA-256: 6526b0c5518b5c3eef3ba1702e7f7e3f5e839c054fdfb8b1b2f649ab26f1fb8d
jenkins-2.361.1.1675406172-1.el8.src.rpm
SHA-256: 37d741269009af497cdff9a7c2f573f1c7ce89ce361950fdbe28da3f0cf72386
openshift-4.10.0-202302072053.p0.g8a6bfe4.assembly.stream.el8.src.rpm
SHA-256: a76335af41c312e6f116166dcd34afaa453ca7d78617a2aea0ead38f72ce8965
openshift-ansible-4.10.0-202302072053.p0.g72c7be6.assembly.stream.el8.src.rpm
SHA-256: b1b72b09070bf66647f617ac97575498cab5510c1de2468c5ffe4e8a9a4e1ce0
openshift-clients-4.10.0-202302072053.p0.gdaed147.assembly.stream.el8.src.rpm
SHA-256: 62e597b45564d6d10af35bc0dbc6d43346ecf7f863816d7f8d13e46d00be81ee
openshift-kuryr-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.src.rpm
SHA-256: eb0f62fe61851e231e33eb88e70bfb22aa617bf373fd1bceb464692493ee7f25
python-sushy-4.1.5-0.20221125154417.ff95176.el8.src.rpm
SHA-256: 29b80c5f8b4dac6c116a96bc6257c805aad4555f95462a273501604eeac62304
ppc64le
atomic-openshift-service-idler-4.10.0-202302072053.p0.ga0f9090.assembly.stream.el8.ppc64le.rpm
SHA-256: 43ecd057f10f902cd21a042a64e12da0e8dab0781d51f22e97901b2e6e0b50af
jenkins-2-plugins-4.10.1675407676-1.el8.noarch.rpm
SHA-256: 3a638e5084f04e1b17f0bcb262244e957e2bbafe988523d430a8aa46060d4f70
jenkins-2.361.1.1675406172-1.el8.noarch.rpm
SHA-256: 9c673187393eee2292940169de6fca8a6a0385e673b39892bde456ec85b43af3
openshift-ansible-4.10.0-202302072053.p0.g72c7be6.assembly.stream.el8.noarch.rpm
SHA-256: b15d0458bf495d48534cae7312ab1969472ff21aece8d4de96e5192268442bf0
openshift-ansible-test-4.10.0-202302072053.p0.g72c7be6.assembly.stream.el8.noarch.rpm
SHA-256: 7cef2bb4cc217273410de5e43d626e4df0a8e562b161fcb14166727f93814b14
openshift-clients-4.10.0-202302072053.p0.gdaed147.assembly.stream.el8.ppc64le.rpm
SHA-256: 6fdaec71214f593925c5adf4342477f24cb3c45e5fb5e4bee2723b258929ec3c
openshift-hyperkube-4.10.0-202302072053.p0.g8a6bfe4.assembly.stream.el8.ppc64le.rpm
SHA-256: c6573a9069832c8feb625d8fb287752da034ecc44daba810a1a1da6c1abbf779
openshift-kuryr-cni-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: 06f0a9824bc6346013d505d2bfb6d8e591a0d48247a42c2b62d5d3e324e966b7
openshift-kuryr-common-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: 1986161d3debb48190368c93522fd3e2ab691da9b9385f9dad75e849d00df259
openshift-kuryr-controller-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: fceaf590f56573cda39614cb9353649a038845ef4e29cccbed7e959e9865e880
python3-kuryr-kubernetes-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: 771495206f93f86b67a387044ca3d59b1779b56c688508f0177253cec6debb64
python3-sushy-4.1.5-0.20221125154417.ff95176.el8.noarch.rpm
SHA-256: 2e405642605fc76826aeff50f292d895dbdc8357a4e541ba0151e3e029cf36e2
python3-sushy-tests-4.1.5-0.20221125154417.ff95176.el8.noarch.rpm
SHA-256: 899bb7ce13cb2b98d17cfa64a90f75c671aef8457e42359b288534b34dd85667
Red Hat OpenShift Container Platform for IBM Z and LinuxONE 4.10 for RHEL 8
SRPM
atomic-openshift-service-idler-4.10.0-202302072053.p0.ga0f9090.assembly.stream.el8.src.rpm
SHA-256: e7f07ac77ecf83bfa0c28671a799495d19f4a9640ae3923c41cbbf1c99ef6823
jenkins-2-plugins-4.10.1675407676-1.el8.src.rpm
SHA-256: 6526b0c5518b5c3eef3ba1702e7f7e3f5e839c054fdfb8b1b2f649ab26f1fb8d
jenkins-2.361.1.1675406172-1.el8.src.rpm
SHA-256: 37d741269009af497cdff9a7c2f573f1c7ce89ce361950fdbe28da3f0cf72386
openshift-4.10.0-202302072053.p0.g8a6bfe4.assembly.stream.el8.src.rpm
SHA-256: a76335af41c312e6f116166dcd34afaa453ca7d78617a2aea0ead38f72ce8965
openshift-ansible-4.10.0-202302072053.p0.g72c7be6.assembly.stream.el8.src.rpm
SHA-256: b1b72b09070bf66647f617ac97575498cab5510c1de2468c5ffe4e8a9a4e1ce0
openshift-clients-4.10.0-202302072053.p0.gdaed147.assembly.stream.el8.src.rpm
SHA-256: 62e597b45564d6d10af35bc0dbc6d43346ecf7f863816d7f8d13e46d00be81ee
openshift-kuryr-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.src.rpm
SHA-256: eb0f62fe61851e231e33eb88e70bfb22aa617bf373fd1bceb464692493ee7f25
python-sushy-4.1.5-0.20221125154417.ff95176.el8.src.rpm
SHA-256: 29b80c5f8b4dac6c116a96bc6257c805aad4555f95462a273501604eeac62304
s390x
atomic-openshift-service-idler-4.10.0-202302072053.p0.ga0f9090.assembly.stream.el8.s390x.rpm
SHA-256: 0d3adb12ee3f6d7e5fbc76e4641cf3096cae4744677ddcf315d6e899909250b1
jenkins-2-plugins-4.10.1675407676-1.el8.noarch.rpm
SHA-256: 3a638e5084f04e1b17f0bcb262244e957e2bbafe988523d430a8aa46060d4f70
jenkins-2.361.1.1675406172-1.el8.noarch.rpm
SHA-256: 9c673187393eee2292940169de6fca8a6a0385e673b39892bde456ec85b43af3
openshift-ansible-4.10.0-202302072053.p0.g72c7be6.assembly.stream.el8.noarch.rpm
SHA-256: b15d0458bf495d48534cae7312ab1969472ff21aece8d4de96e5192268442bf0
openshift-ansible-test-4.10.0-202302072053.p0.g72c7be6.assembly.stream.el8.noarch.rpm
SHA-256: 7cef2bb4cc217273410de5e43d626e4df0a8e562b161fcb14166727f93814b14
openshift-clients-4.10.0-202302072053.p0.gdaed147.assembly.stream.el8.s390x.rpm
SHA-256: 79432671c0e121bd584e8324f406ff0189c71bc2cb2a7bcf31b51ff2755ab448
openshift-hyperkube-4.10.0-202302072053.p0.g8a6bfe4.assembly.stream.el8.s390x.rpm
SHA-256: 1087087286c6ca2d715d898e50fd8d8d1450213a7de2c4086953e0cba7c545d0
openshift-kuryr-cni-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: 06f0a9824bc6346013d505d2bfb6d8e591a0d48247a42c2b62d5d3e324e966b7
openshift-kuryr-common-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: 1986161d3debb48190368c93522fd3e2ab691da9b9385f9dad75e849d00df259
openshift-kuryr-controller-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: fceaf590f56573cda39614cb9353649a038845ef4e29cccbed7e959e9865e880
python3-kuryr-kubernetes-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: 771495206f93f86b67a387044ca3d59b1779b56c688508f0177253cec6debb64
python3-sushy-4.1.5-0.20221125154417.ff95176.el8.noarch.rpm
SHA-256: 2e405642605fc76826aeff50f292d895dbdc8357a4e541ba0151e3e029cf36e2
python3-sushy-tests-4.1.5-0.20221125154417.ff95176.el8.noarch.rpm
SHA-256: 899bb7ce13cb2b98d17cfa64a90f75c671aef8457e42359b288534b34dd85667
Red Hat OpenShift Container Platform for ARM 64 4.10
SRPM
atomic-openshift-service-idler-4.10.0-202302072053.p0.ga0f9090.assembly.stream.el8.src.rpm
SHA-256: e7f07ac77ecf83bfa0c28671a799495d19f4a9640ae3923c41cbbf1c99ef6823
jenkins-2-plugins-4.10.1675407676-1.el8.src.rpm
SHA-256: 6526b0c5518b5c3eef3ba1702e7f7e3f5e839c054fdfb8b1b2f649ab26f1fb8d
jenkins-2.361.1.1675406172-1.el8.src.rpm
SHA-256: 37d741269009af497cdff9a7c2f573f1c7ce89ce361950fdbe28da3f0cf72386
openshift-4.10.0-202302072053.p0.g8a6bfe4.assembly.stream.el8.src.rpm
SHA-256: a76335af41c312e6f116166dcd34afaa453ca7d78617a2aea0ead38f72ce8965
openshift-ansible-4.10.0-202302072053.p0.g72c7be6.assembly.stream.el8.src.rpm
SHA-256: b1b72b09070bf66647f617ac97575498cab5510c1de2468c5ffe4e8a9a4e1ce0
openshift-clients-4.10.0-202302072053.p0.gdaed147.assembly.stream.el8.src.rpm
SHA-256: 62e597b45564d6d10af35bc0dbc6d43346ecf7f863816d7f8d13e46d00be81ee
openshift-kuryr-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.src.rpm
SHA-256: eb0f62fe61851e231e33eb88e70bfb22aa617bf373fd1bceb464692493ee7f25
python-sushy-4.1.5-0.20221125154417.ff95176.el8.src.rpm
SHA-256: 29b80c5f8b4dac6c116a96bc6257c805aad4555f95462a273501604eeac62304
aarch64
atomic-openshift-service-idler-4.10.0-202302072053.p0.ga0f9090.assembly.stream.el8.aarch64.rpm
SHA-256: c29efe7ebe3f8d07b3cf9ede40d1792103cf8f1f28d942c03eb817a941771b50
jenkins-2-plugins-4.10.1675407676-1.el8.noarch.rpm
SHA-256: 3a638e5084f04e1b17f0bcb262244e957e2bbafe988523d430a8aa46060d4f70
jenkins-2.361.1.1675406172-1.el8.noarch.rpm
SHA-256: 9c673187393eee2292940169de6fca8a6a0385e673b39892bde456ec85b43af3
openshift-ansible-4.10.0-202302072053.p0.g72c7be6.assembly.stream.el8.noarch.rpm
SHA-256: b15d0458bf495d48534cae7312ab1969472ff21aece8d4de96e5192268442bf0
openshift-ansible-test-4.10.0-202302072053.p0.g72c7be6.assembly.stream.el8.noarch.rpm
SHA-256: 7cef2bb4cc217273410de5e43d626e4df0a8e562b161fcb14166727f93814b14
openshift-clients-4.10.0-202302072053.p0.gdaed147.assembly.stream.el8.aarch64.rpm
SHA-256: 7c1514b94be4f365b65aa40f2daf7d42e8dd273fac24c6ab5c8ffa896b36168e
openshift-hyperkube-4.10.0-202302072053.p0.g8a6bfe4.assembly.stream.el8.aarch64.rpm
SHA-256: 6bf0e6d8fc3f1af00bb2dd11238c29af41a5f7dc50a7a52a43eb68bf4ce370e1
openshift-kuryr-cni-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: 06f0a9824bc6346013d505d2bfb6d8e591a0d48247a42c2b62d5d3e324e966b7
openshift-kuryr-common-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: 1986161d3debb48190368c93522fd3e2ab691da9b9385f9dad75e849d00df259
openshift-kuryr-controller-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: fceaf590f56573cda39614cb9353649a038845ef4e29cccbed7e959e9865e880
python3-kuryr-kubernetes-4.10.0-202302072053.p0.gd4f4d9a.assembly.stream.el8.noarch.rpm
SHA-256: 771495206f93f86b67a387044ca3d59b1779b56c688508f0177253cec6debb64
python3-sushy-4.1.5-0.20221125154417.ff95176.el8.noarch.rpm
SHA-256: 2e405642605fc76826aeff50f292d895dbdc8357a4e541ba0151e3e029cf36e2
python3-sushy-tests-4.1.5-0.20221125154417.ff95176.el8.noarch.rpm
SHA-256: 899bb7ce13cb2b98d17cfa64a90f75c671aef8457e42359b288534b34dd85667
Related news
Red Hat Security Advisory 2024-1353-03 - An update is now available for Red Hat Process Automation Manager. Issues addressed include code execution, denial of service, and deserialization vulnerabilities.
Atlassian has released software fixes to address four critical flaws in its software that, if successfully exploited, could result in remote code execution. The list of vulnerabilities is below - CVE-2022-1471 (CVSS score: 9.8) - Deserialization vulnerability in SnakeYAML library that can lead to remote code execution in multiple products CVE-2023-22522 (CVSS score
Cybersecurity researchers have disclosed multiple critical security flaws in the TorchServe tool for serving and scaling PyTorch models that could be chained to achieve remote code execution on affected systems. Israel-based runtime application security company Oligo, which made the discovery, has coined the vulnerabilities ShellTorch. "These vulnerabilities [...] can lead to a full chain Remote
Red Hat Security Advisory 2023-5165-01 - Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency. Issues addressed include code execution, denial of service, deserialization, and integer overflow vulnerabilities.
An update is now available for Red Hat OpenShift Application Runtimes. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46877: A flaw was found in Jackson Databind. This issue may allow a malicious user to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization. * CVE-2022-1471: A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malici...
Vulnerability in the Oracle Hyperion Financial Reporting product of Oracle Hyperion (component: Repository). The supported version that is affected is 11.2.13.0.000. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hyperion Financial Reporting. While the vulnerability is in Oracle Hyperion Financial Reporting, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hyperion Financial Reporting accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hyperion Financial Reporting. CVSS 3.1 Base Score 8.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L).
Red Hat Security Advisory 2023-3198-01 - Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Issues addressed include bypass, code execution, cross site request forgery, cross site scripting, denial of service, deserialization, information leakage, and insecure permissions vulnerabilities.
Red Hat Security Advisory 2023-2097-03 - Red Hat Satellite is a systems management tool for Linux-based infrastructure. It allows for provisioning, remote management, and monitoring of multiple Linux deployments with a single centralized tool. Issues addressed include code execution, cross site scripting, denial of service, deserialization, improper neutralization, information leakage, and remote shell upload vulnerabilities.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...
Red Hat Security Advisory 2023-1514-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.10 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include code execution, denial of service, deserialization, and information leakage vulnerabilities.
A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1471: A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE). * CVE-2022-4492: A flaw was found in undertow. The undertow c...
Red Hat Security Advisory 2023-1454-01 - An update is now available for Red Hat OpenShift GitOps 1.7. Red Hat Product Security has rated this update as having a security impact of Moderate.
An update is now available for Red Hat OpenShift GitOps 1.7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41354: An information disclosure flaw was found in Argo CD. This issue may allow unauthorized users to enumerate application names by inspecting API error messages and could use the discovered application names as the starting point of another attack. For example, the attacker might use their knowledge of an application name to convince an administrator to grant ...
An update is now available for Red Hat OpenShift GitOps 1.6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41354: An information disclosure flaw was found in Argo CD. This issue may allow unauthorized users to enumerate application names by inspecting API error messages and could use the discovered application names as the starting point of another attack. For example, the attacker might use their knowledge of an application name to convince an administrator to grant ...
An update is now available for Red Hat build of Quarkus. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For more information, see the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1471: A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE). * CVE-2022-3171: A parsing issue with binary data in protobuf-java core an...
Red Hat Security Advisory 2023-1045-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 9 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1049-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, open redirection, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1043-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
Red Hat Security Advisory 2023-1044-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
New Red Hat Single Sign-On 7.6.2 packages are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-14040: In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. * CVE-2018-14042: In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. * CVE-2019-11358: A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modi...
New Red Hat Single Sign-On 7.6.2 packages are now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-14040: In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. * CVE-2018-14042: In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. * CVE-2019-11358: A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modi...
New Red Hat Single Sign-On 7.6.2 packages are now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-14040: In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. * CVE-2018-14042: In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. * CVE-2019-11358: A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modi...
Red Hat Security Advisory 2023-0777-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.9.56. Issues addressed include bypass, code execution, cross site request forgery, cross site scripting, denial of service, deserialization, and improper authorization vulnerabilities.
Red Hat Security Advisory 2023-0778-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.9.56.
Red Hat OpenShift Container Platform release 4.9.56 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-7692: PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enou...
Red Hat OpenShift Container Platform release 4.9.56 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3064: A flaw was found in go-yaml. This issue causes the consumption of excessive amounts of CPU or memory when attempting to parse a large or maliciously crafted YAML document.
Red Hat Security Advisory 2023-0698-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.52.
Red Hat Security Advisory 2023-0697-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.52. Issues addressed include code execution and deserialization vulnerabilities.
Red Hat Security Advisory 2023-0758-01 - This release of Red Hat build of Quarkus 2.13.7 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Issues addressed include code execution, denial of service, deserialization, and information leakage vulnerabilities.
Red Hat OpenShift Container Platform release 4.10.52 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-3064: A flaw was found in go-yaml. This issue causes the consumption of excessive amounts of CPU or memory when attempting to parse a large or maliciously crafted YAML document.
An update is now available for Red Hat build of Quarkus. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For more information, see the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1471: A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE). * CVE-2022-41881: A flaw was found in codec-haproxy from the Netty project....
Red Hat Security Advisory 2023-0470-01 - An update is now available for Migration Toolkit for Runtimes (v1.0.1).
An update is now available for Migration Toolkit for Runtimes (v1.0.1). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-42920: Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing
Red Hat Security Advisory 2022-9058-01 - Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target. Issues addressed include code execution and deserialization vulnerabilities.
Red Hat Security Advisory 2022-9032-01 - This release of Red Hat build of Eclipse Vert.x 4.3.4 GA includes security updates. For more information, see the release notes listed in the References section. Issues addressed include code execution and deserialization vulnerabilities.
An update for prometheus-jmx-exporter is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1471: SnakeYaml: Constructor Deserialization Remote Code Execution
An update is now available for Red Hat build of Eclipse Vert.x. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For more information, see the CVE pages listed in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1471: SnakeYaml: Constructor Deserialization Remote Code Execution * CVE-2022-42003: jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS * CVE-2022-42004: jackson-databind: use of deeply nested arrays
### Summary SnakeYaml's `Constructor` class, which inherits from `SafeConstructor`, allows any type be deserialized given the following line: new Yaml(new Constructor(TestDataClass.class)).load(yamlContent); Types do not have to match the types of properties in the target class. A `ConstructorException` is thrown, but only after a malicious payload is deserialized. ### Severity High, lack of type checks during deserialization allows remote code execution. ### Proof of Concept Execute `bash run.sh`. The PoC uses Constructor to deserialize a payload for RCE. RCE is demonstrated by using a payload which performs a http request to http://127.0.0.1:8000. Example output of successful run of proof of concept: ``` $ bash run.sh [+] Downloading snakeyaml if needed [+] Starting mock HTTP server on 127.0.0.1:8000 to demonstrate RCE nc: no process found [+] Compiling and running Proof of Concept, which a payload that sends a HTTP request to mock web server. [+] An exception is expected. Exc...
SnakeYaml's Constructor() class does not restrict types which can be instantiated during deserialization. Deserializing yaml content provided by an attacker can lead to remote code execution. We recommend using SnakeYaml's SafeConsturctor when parsing untrusted content to restrict deserialization.
Jenkins xUnit Plugin 3.0.8 and earlier implements an agent-to-controller message that creates a user-specified directory if it doesn't exist, and parsing files inside it as test results, allowing attackers able to control agent processes to create an arbitrary directory on the Jenkins controller or to obtain test results from existing files in an attacker-specified directory.
Jenkins Embeddable Build Status Plugin 2.0.3 and earlier does not correctly perform the ViewStatus permission check in the HTTP endpoint it provides for "unprotected" status badge access, allowing attackers without any permissions to obtain the build status badge icon for any attacker-specified job and/or build.
A missing permission check in Jenkins EasyQA Plugin 1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server.
A cross-site request forgery (CSRF) vulnerability in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers to connect to an attacker-specified URL.
A cross-site request forgery (CSRF) vulnerability in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers to connect to an attacker-specified URL.
A cross-site request forgery (CSRF) vulnerability in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers to connect to an attacker-specified URL.
A cross-site request forgery (CSRF) vulnerability in Jenkins vRealize Orchestrator Plugin 3.0 and earlier allows attackers to send an HTTP POST request to an attacker-specified URL.
In Jenkins 2.340 through 2.355 (both inclusive) the tooltip of the build button in list views supports HTML without escaping the job display name, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Jenkins Agent Server Parameter Plugin 1.1 and earlier does not escape the name and description of Agent Server parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Jenkins user database security realm.