-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: Node Health Check Operator 0.3.1 security update Advisory ID: RHSA-2022:6187-01 Product: RHWA Advisory URL: https://access.redhat.com/errata/RHSA-2022:6187 Issue date: 2022-08-25 CVE Names: CVE-2022-1705 CVE-2022-28327 CVE-2022-30631 ==================================================================== 1. Summary: An update for node-healthcheck-operator-bundle-container and node-healthcheck-operator-container is now available for Node Healthcheck Operator 0.3 for RHEL 8. This Operator is delivered by Red Hat Workload Availability. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: This is an updated release of the Node Health Check Operator. You can use the Node Health Check Operator to deploy the Node Health Check controller. The controller identifies unhealthy nodes and uses the Self Node Remediation Operator to remediate the unhealthy nodes. Security Fix(es): * golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631) * golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705) * golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, see the CVE page(s) listed in the References section. 3. Solution: For details on how to apply this update, which includes the changes described in this advisory, see: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar 2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read 2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header 5. References: https://access.redhat.com/security/cve/CVE-2022-1705 https://access.redhat.com/security/cve/CVE-2022-28327 https://access.redhat.com/security/cve/CVE-2022-30631 https://access.redhat.com/security/updates/classification/#important 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYwdmINzjgjWX9erEAQjPeA//fEoHtKPUAhaRTzT/uTOHFq5XTwhMGxRG 1HRYyePdYd28JrYCSj2dWvTYi44Crg8h4J5YgWRag8gX3Z+mVlmHC2ioxJ5rmAa2 7KJ9z4e0ulTtOIL9YiRDaPR+An0pnf1sQMSBvEHD6SiKhK4fFznweZ0y/+/rMgZh y7SizhF7/pQPzmvGInuZYzpUWeBbK4C2KzHxeSACNebMJQedUUV8thDdTo4ZykTu F7jKBJdveplKbtUf7+1nTABk991ufPR/YVSo9AhSV/qphUPBqMOX5A8tvCnBHXnm +Cee3y7U6sBKmXqUw+PwgOIC+QKd+ZPRczPf9YRdapq216Tke0y3RKQry8SFrtXm 7yIjY7/LYBpy+amktAW0jj2V5f7A60xM578RxykK5DhY/1StPtJ0tLIltFBE0UHw gn8ruU5fZwRWjL/yAtvoKvX7CnxtUzgbl8aci+/LRV7g8oX0cztafK5yMg/YfFTK xuEkJJX8SCr5oKdP+90u0Or5e+aDz7lv4KV4D89weL0Tnc3+AXbT1ObkcunB0AB/ FA9Oli4WijcDpbSV+Q8VFOYFeyJwAQZMC5zqSGIgkZYFOIQRNmdH2snyjKq9XFvm T6v1Gg/oQ79EDTyrxuh/LL5dKadwMFztvM8G/IlimKqhT/jiz1Im+++dFPiKyBt5 t8afby61f/4=L8tc -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce