-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Service Binding Operator security update Advisory ID: RHSA-2023:0918-01 Product: OpenShift Developer Tools and Services Advisory URL: https://access.redhat.com/errata/RHSA-2023:0918 Issue date: 2023-02-27 CVE Names: CVE-2021-46848 CVE-2022-1304 CVE-2022-22624 CVE-2022-22628 CVE-2022-22629 CVE-2022-22662 CVE-2022-26700 CVE-2022-26709 CVE-2022-26710 CVE-2022-26716 CVE-2022-26717 CVE-2022-26719 CVE-2022-30293 CVE-2022-35737 CVE-2022-40303 CVE-2022-40304 CVE-2022-41717 CVE-2022-42898 CVE-2022-47629 ==================================================================== 1. Summary: An update for service-binding-operator-bundle-container and service-binding-operator-container is now available for OpenShift Developer Tools and Services for OCP 4.9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Service Binding manages the data plane for applications and backing services. Security Fix(es): * golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2161274 - CVE-2022-41717 golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests 5. JIRA issues fixed (https://issues.jboss.org/): APPSVC-1204 - Provisioned Service discovery APPSVC-1256 - CVE-2022-41717 6. References: https://access.redhat.com/security/cve/CVE-2021-46848 https://access.redhat.com/security/cve/CVE-2022-1304 https://access.redhat.com/security/cve/CVE-2022-22624 https://access.redhat.com/security/cve/CVE-2022-22628 https://access.redhat.com/security/cve/CVE-2022-22629 https://access.redhat.com/security/cve/CVE-2022-22662 https://access.redhat.com/security/cve/CVE-2022-26700 https://access.redhat.com/security/cve/CVE-2022-26709 https://access.redhat.com/security/cve/CVE-2022-26710 https://access.redhat.com/security/cve/CVE-2022-26716 https://access.redhat.com/security/cve/CVE-2022-26717 https://access.redhat.com/security/cve/CVE-2022-26719 https://access.redhat.com/security/cve/CVE-2022-30293 https://access.redhat.com/security/cve/CVE-2022-35737 https://access.redhat.com/security/cve/CVE-2022-40303 https://access.redhat.com/security/cve/CVE-2022-40304 https://access.redhat.com/security/cve/CVE-2022-41717 https://access.redhat.com/security/cve/CVE-2022-42898 https://access.redhat.com/security/cve/CVE-2022-47629 https://access.redhat.com/security/updates/classification/#moderate 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIUAwUBY/xNo9zjgjWX9erEAQh2XA/1H4kyOvgq1wB/cW41Sczdbljxq0R5nJ5d H0LQm3vxbU7g5I327U6PGso+4Z2Z5NoiZLruXCca/KMko7O2v5AP8e4rYV0LYOeI 7HOgXPMBJRcyGEcPXPgNR6HEHAr/BKyLlTbl6tZ9sPItMhSv5eKUMjtTAggNCNiQ DPCwNr5o7HK0qDr4B41Y5kSPaOFl41rDB0Xbq9WigkUYmal8WBJ7xp76zvdYc3Uu e34OGMrQVqw8apJUyJUlH4WOU3hs/I8oCuyJuecIYuVWtft65m5Bk2ZqEHTgMmA0 5pXDcw/lhIgC/yofVWQQ41rRmIcR1VJAJ0mz1gsPC8f/gHE4hqlXIlLIUezslWoR kgaKARfjm7rLAB3JUzcKqU1a1IuYNOGZW1wkPC6PFADAkSjsn0OxLXoyFM/aYMsf 8eTQ+Pkv7hO3OCC/db42YlN+7QtFYxwlgxVnNEvY+e3LMfVLDbIWPv0Mydl+YDaR mLpIWm/NYkTD5esDA3yDdB6lhrpqU30ISkWniMaQ+6mvcZakhytGOWaQ42yeV4QA uVuKKPj1CsPcodzLhfvIa3uNenqjsdYQ27MztJGdyPGuozjJjxRqsSblH7oAI56d pBJ0nwmFQFfQVVNgPN77jpIDLGoUyqGBtwYr0p02aufJIHDq+ANaL31Qq3QaRmlJ VRjZbVTZfw==6W66 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce