Lucene search

K
redhatRedHatRHSA-2022:7399
HistoryJan 17, 2023 - 7:33 p.m.

(RHSA-2022:7399) Moderate: OpenShift Container Platform 4.12.0 bug fix and security update

2023-01-1719:33:50
access.redhat.com
16

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

75.9%

Red Hat OpenShift Container Platform is Red Hat’s cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.0. See the following advisory for the RPM packages for this release:

https://access.redhat.com/errata/RHSA-2022:7398

Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:

https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html

Security Fix(es):

  • golang: out-of-bounds read in golang.org/x/text/language leads to DoS
    (CVE-2021-38561)
  • golang: net/http: improper sanitization of Transfer-Encoding header
    (CVE-2022-1705)
  • golang: archive/tar: unbounded memory consumption when reading headers
    (CVE-2022-2879)
  • golang: net/http/httputil: ReverseProxy should not forward unparseable
    query parameters (CVE-2022-2880)
  • prometheus/client_golang: Denial of service using
    InstrumentHandlerCounter (CVE-2022-21698)
  • golang: net/http/httputil: NewSingleHostReverseProxy - omit
    X-Forwarded-For not working (CVE-2022-32148)
  • golang: net/url: JoinPath does not strip relative path components in all
    circumstances (CVE-2022-32190)
  • vault: insufficient certificate revocation list checking (CVE-2022-41316)
  • golang: regexp/syntax: limit memory used by parsing regexps
    (CVE-2022-41715)
  • openshift: etcd grpc-proxy vulnerable to The Birthday attack against 64-bit block cipher (CVE-2023-0296)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s)
listed in the References section.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

75.9%