Red Hat Security Advisory 2022-0476-01 - Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications. Issues addressed include a traversal vulnerability.
929378052a3a411f8efbf9599d884f20c434cba232af8d52e55c49760a05849e
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: Red Hat OpenShift GitOps security update
Advisory ID: RHSA-2022:0476-01
Product: Red Hat OpenShift GitOps
Advisory URL: https://access.redhat.com/errata/RHSA-2022:0476
Issue date: 2022-02-08
CVE Names: CVE-2021-3521 CVE-2021-3712 CVE-2021-3872
CVE-2021-3984 CVE-2021-4019 CVE-2021-4122
CVE-2021-4192 CVE-2021-4193 CVE-2022-24348
=====================================================================
1. Summary:
An update is now available for Red Hat OpenShift GitOps 1.3
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Description:
Red Hat Openshift GitOps is a declarative way to implement continuous
deployment for cloud native applications.
Security Fix(es):
* gitops: Path traversal and dereference of symlinks when passing Helm
value files (CVE-2022-24348)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
3. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
4. Bugs fixed (https://bugzilla.redhat.com/):
2050826 - CVE-2022-24348 gitops: Path traversal and dereference of symlinks when passing Helm value files
5. JIRA issues fixed (https://issues.jboss.org/):
GITOPS-1758 - [Release] OpenShift GitOps v.1.3.3
6. References:
https://access.redhat.com/security/cve/CVE-2021-3521
https://access.redhat.com/security/cve/CVE-2021-3712
https://access.redhat.com/security/cve/CVE-2021-3872
https://access.redhat.com/security/cve/CVE-2021-3984
https://access.redhat.com/security/cve/CVE-2021-4019
https://access.redhat.com/security/cve/CVE-2021-4122
https://access.redhat.com/security/cve/CVE-2021-4192
https://access.redhat.com/security/cve/CVE-2021-4193
https://access.redhat.com/security/cve/CVE-2022-24348
https://access.redhat.com/security/updates/classification/#important
7. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIVAwUBYgNt1tzjgjWX9erEAQgMLxAAnF9maBRZmqfAlYRSIqLD0OOIz7f5lQDT
fKmJXmCFy4YA0X7MzmZoPzJ61w6dD980u2hjmbHaDexal5ohYStnhBPE4sdVV2IJ
5xNVEB+T/n240UPxGLJRmPcEB1PVm1xy25ByD6IRQC14Rghy2+g52MU9yDBD1xTZ
rSayyt+h0PTJJ3KPTUtBWL4E2koBUOyRV7oENCwTD5PVyppl1llKc85SdacJ+QVr
QvBtp+Vku4swjiTwLcB1zw7MWTHn7+Cf1ZO5WgLvYsgnqNbautatpuwC8lduKLeJ
miX83+qKjNQyKaCaofKnMoe/YInUWefQ8vwEQThZz6aObzzBh+D5mcodXHcETsEj
JYuC62KjBEviBOk5VM4X6TlVPty7PuOx0gUtnHKZZYwBLgNmy9ZhKEW87Tpt+81P
0wpDA5l2x+95q15oXBJoOHRbxbYwK4YDsKje+zA3voKRdu8SXXGZ5CAVy8UawAnu
xiHFKckPvXteGrmfrlh/2gA1t8moZ/tXVMIZkyLyW643SbfnbdQt1/pk0hWAPKke
pYRpijy4uwMzvb3hjzfSOUjZYEb+i+Va013vSh1WJlyP0Im4vvukV6QlFF1tHEJ+
H0b6i8hq/z6zQzOjkLPo6KG+/y7CfUyZIoplggJy6Cl2+86x0UQVRXBij12SgZ4n
pagSliMhedQ=
=QqCM
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce