Lucene search

K
redhatRedHatRHSA-2023:1655
HistoryApr 12, 2023 - 11:51 a.m.

(RHSA-2023:1655) Critical: OpenShift Container Platform 4.10.56 security update

2023-04-1211:51:14
access.redhat.com
90
red hat openshift container platform
kubernetes
security update
rpm packages
cve-2022-42889
cve-2022-31690
cve-2022-31692
cve-2023-24422
cve-2023-27898
cve-2023-27899
cve-2022-3172
cve-2023-27903
cve-2023-27904
vulnerabilities
cvss score

0.972 High

EPSS

Percentile

99.8%

Red Hat OpenShift Container Platform is Red Hat’s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.56. See the following advisory for the container images for this release:

https://access.redhat.com/errata/RHSA-2023:1656

Security Fix(es):

  • apache-commons-text: variable interpolation RCE (CVE-2022-42889)

  • spring-security-oauth2-client: Privilege Escalation in spring-security-oauth2-client (CVE-2022-31690)

  • spring-security: Authorization rules can be bypassed via forward or include dispatcher types in Spring Security (CVE-2022-31692)

  • jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin (CVE-2023-24422)

  • Jenkins: XSS vulnerability in plugin manager (CVE-2023-27898)

  • Jenkins: Temporary plugin file created with insecure permissions (CVE-2023-27899)

  • kube-apiserver: Aggregated API server can cause clients to be redirected (SSRF) (CVE-2022-3172)

  • Jenkins: Temporary file parameter created with insecure permissions (CVE-2023-27903)

  • Jenkins: Information disclosure through error stack traces related to agents (CVE-2023-27904)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.