rhsa-2023_4276
Vulnerability from csaf_redhat
Published
2023-07-25 18:31
Modified
2024-12-01 15:11
Summary
Red Hat Security Advisory: DevWorkspace Operator Security Update
Notes
Topic
An update is now available for Red Hat DevWorkspace Operator.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Details
The DevWorkspace Operator extends OpenShift to provide DevWorkspace support.
Security Fix(es):
* openshift: OCP & FIPS mode (CVE-2023-3089)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat DevWorkspace Operator.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The DevWorkspace Operator extends OpenShift to provide DevWorkspace support.\n\nSecurity Fix(es):\n\n* openshift: OCP \u0026 FIPS mode (CVE-2023-3089)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:4276", "url": "https://access.redhat.com/errata/RHSA-2023:4276" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-001" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2212085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212085" }, { "category": "external", "summary": "CRW-4562", "url": "https://issues.redhat.com/browse/CRW-4562" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4276.json" } ], "title": "Red Hat Security Advisory: DevWorkspace Operator Security Update", "tracking": { "current_release_date": "2024-12-01T15:11:04+00:00", "generator": { "date": "2024-12-01T15:11:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2023:4276", "initial_release_date": "2023-07-25T18:31:29+00:00", "revision_history": [ { "date": "2023-07-25T18:31:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-07-25T18:31:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-01T15:11:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Devworkspace 1.0 for RHEL 8", "product": { "name": "Devworkspace 1.0 for RHEL 8", "product_id": "8Base-DEVWORKSPACE-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:devworkspace:1.0::el8" } } } ], "category": "product_family", "name": "DEVWORKSPACE" }, { "branches": [ { "category": "product_version", "name": "devworkspace/devworkspace-operator-bundle@sha256:0090f19f2409c98b61dea57f905d355591ea5a554bf89e1d5accea6830b38be6_ppc64le", "product": { "name": "devworkspace/devworkspace-operator-bundle@sha256:0090f19f2409c98b61dea57f905d355591ea5a554bf89e1d5accea6830b38be6_ppc64le", "product_id": "devworkspace/devworkspace-operator-bundle@sha256:0090f19f2409c98b61dea57f905d355591ea5a554bf89e1d5accea6830b38be6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/devworkspace-operator-bundle@sha256:0090f19f2409c98b61dea57f905d355591ea5a554bf89e1d5accea6830b38be6?arch=ppc64le\u0026repository_url=registry.redhat.io/devworkspace/devworkspace-operator-bundle\u0026tag=0.21-7" } } }, { "category": "product_version", "name": "devworkspace/devworkspace-rhel8-operator@sha256:94ba245d62074146b89252df5cc0d6456e674ed324e8ebec72c8f9821b6fbca8_ppc64le", "product": { "name": "devworkspace/devworkspace-rhel8-operator@sha256:94ba245d62074146b89252df5cc0d6456e674ed324e8ebec72c8f9821b6fbca8_ppc64le", "product_id": "devworkspace/devworkspace-rhel8-operator@sha256:94ba245d62074146b89252df5cc0d6456e674ed324e8ebec72c8f9821b6fbca8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/devworkspace-rhel8-operator@sha256:94ba245d62074146b89252df5cc0d6456e674ed324e8ebec72c8f9821b6fbca8?arch=ppc64le\u0026repository_url=registry.redhat.io/devworkspace/devworkspace-rhel8-operator\u0026tag=0.21-5" } } }, { "category": "product_version", "name": "devworkspace/devworkspace-project-clone-rhel8@sha256:3bd91ebeab17e83e2e2477211c4a113808549dbd5b59fdc35fd2ec5c8e2a8ecc_ppc64le", "product": { "name": "devworkspace/devworkspace-project-clone-rhel8@sha256:3bd91ebeab17e83e2e2477211c4a113808549dbd5b59fdc35fd2ec5c8e2a8ecc_ppc64le", "product_id": "devworkspace/devworkspace-project-clone-rhel8@sha256:3bd91ebeab17e83e2e2477211c4a113808549dbd5b59fdc35fd2ec5c8e2a8ecc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/devworkspace-project-clone-rhel8@sha256:3bd91ebeab17e83e2e2477211c4a113808549dbd5b59fdc35fd2ec5c8e2a8ecc?arch=ppc64le\u0026repository_url=registry.redhat.io/devworkspace/devworkspace-project-clone-rhel8\u0026tag=0.21-5" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "devworkspace/devworkspace-operator-bundle@sha256:1600c0fd5a6810f02ccb1440f5e03731b38891983d2a2fb13aa332bbc433eeaf_amd64", "product": { "name": "devworkspace/devworkspace-operator-bundle@sha256:1600c0fd5a6810f02ccb1440f5e03731b38891983d2a2fb13aa332bbc433eeaf_amd64", "product_id": "devworkspace/devworkspace-operator-bundle@sha256:1600c0fd5a6810f02ccb1440f5e03731b38891983d2a2fb13aa332bbc433eeaf_amd64", "product_identification_helper": { "purl": "pkg:oci/devworkspace-operator-bundle@sha256:1600c0fd5a6810f02ccb1440f5e03731b38891983d2a2fb13aa332bbc433eeaf?arch=amd64\u0026repository_url=registry.redhat.io/devworkspace/devworkspace-operator-bundle\u0026tag=0.21-7" } } }, { "category": "product_version", "name": "devworkspace/devworkspace-rhel8-operator@sha256:41a0aaa72619f526934d08cd8191ea998cabc58b1bea8b8fcadd7bdb0fe173e7_amd64", "product": { "name": "devworkspace/devworkspace-rhel8-operator@sha256:41a0aaa72619f526934d08cd8191ea998cabc58b1bea8b8fcadd7bdb0fe173e7_amd64", "product_id": "devworkspace/devworkspace-rhel8-operator@sha256:41a0aaa72619f526934d08cd8191ea998cabc58b1bea8b8fcadd7bdb0fe173e7_amd64", "product_identification_helper": { "purl": "pkg:oci/devworkspace-rhel8-operator@sha256:41a0aaa72619f526934d08cd8191ea998cabc58b1bea8b8fcadd7bdb0fe173e7?arch=amd64\u0026repository_url=registry.redhat.io/devworkspace/devworkspace-rhel8-operator\u0026tag=0.21-5" } } }, { "category": "product_version", "name": "devworkspace/devworkspace-project-clone-rhel8@sha256:d41c9571370906141c551246fc22ad16d716bf3f4bc183b90c280e4e435d9a15_amd64", "product": { "name": "devworkspace/devworkspace-project-clone-rhel8@sha256:d41c9571370906141c551246fc22ad16d716bf3f4bc183b90c280e4e435d9a15_amd64", "product_id": "devworkspace/devworkspace-project-clone-rhel8@sha256:d41c9571370906141c551246fc22ad16d716bf3f4bc183b90c280e4e435d9a15_amd64", "product_identification_helper": { "purl": "pkg:oci/devworkspace-project-clone-rhel8@sha256:d41c9571370906141c551246fc22ad16d716bf3f4bc183b90c280e4e435d9a15?arch=amd64\u0026repository_url=registry.redhat.io/devworkspace/devworkspace-project-clone-rhel8\u0026tag=0.21-5" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "devworkspace/devworkspace-operator-bundle@sha256:1c1c2245d70ad787b537bcdde2742d39dd1171809d5b459ffea82630da9a51a9_s390x", "product": { "name": "devworkspace/devworkspace-operator-bundle@sha256:1c1c2245d70ad787b537bcdde2742d39dd1171809d5b459ffea82630da9a51a9_s390x", "product_id": "devworkspace/devworkspace-operator-bundle@sha256:1c1c2245d70ad787b537bcdde2742d39dd1171809d5b459ffea82630da9a51a9_s390x", "product_identification_helper": { "purl": "pkg:oci/devworkspace-operator-bundle@sha256:1c1c2245d70ad787b537bcdde2742d39dd1171809d5b459ffea82630da9a51a9?arch=s390x\u0026repository_url=registry.redhat.io/devworkspace/devworkspace-operator-bundle\u0026tag=0.21-7" } } }, { "category": "product_version", "name": "devworkspace/devworkspace-rhel8-operator@sha256:e4ab2900e371c2533e28ec6a587e08a8143ef95cde2d8003a3490b0c4b23b152_s390x", "product": { "name": "devworkspace/devworkspace-rhel8-operator@sha256:e4ab2900e371c2533e28ec6a587e08a8143ef95cde2d8003a3490b0c4b23b152_s390x", "product_id": "devworkspace/devworkspace-rhel8-operator@sha256:e4ab2900e371c2533e28ec6a587e08a8143ef95cde2d8003a3490b0c4b23b152_s390x", "product_identification_helper": { "purl": "pkg:oci/devworkspace-rhel8-operator@sha256:e4ab2900e371c2533e28ec6a587e08a8143ef95cde2d8003a3490b0c4b23b152?arch=s390x\u0026repository_url=registry.redhat.io/devworkspace/devworkspace-rhel8-operator\u0026tag=0.21-5" } } }, { "category": "product_version", "name": "devworkspace/devworkspace-project-clone-rhel8@sha256:2d4e1ecf7d0a9968b84d1453838a23619d8d0be32b2352275b5931e070e90c42_s390x", "product": { "name": "devworkspace/devworkspace-project-clone-rhel8@sha256:2d4e1ecf7d0a9968b84d1453838a23619d8d0be32b2352275b5931e070e90c42_s390x", "product_id": "devworkspace/devworkspace-project-clone-rhel8@sha256:2d4e1ecf7d0a9968b84d1453838a23619d8d0be32b2352275b5931e070e90c42_s390x", "product_identification_helper": { "purl": "pkg:oci/devworkspace-project-clone-rhel8@sha256:2d4e1ecf7d0a9968b84d1453838a23619d8d0be32b2352275b5931e070e90c42?arch=s390x\u0026repository_url=registry.redhat.io/devworkspace/devworkspace-project-clone-rhel8\u0026tag=0.21-5" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "devworkspace/devworkspace-operator-bundle@sha256:0090f19f2409c98b61dea57f905d355591ea5a554bf89e1d5accea6830b38be6_ppc64le as a component of Devworkspace 1.0 for RHEL 8", "product_id": "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-operator-bundle@sha256:0090f19f2409c98b61dea57f905d355591ea5a554bf89e1d5accea6830b38be6_ppc64le" }, "product_reference": "devworkspace/devworkspace-operator-bundle@sha256:0090f19f2409c98b61dea57f905d355591ea5a554bf89e1d5accea6830b38be6_ppc64le", "relates_to_product_reference": "8Base-DEVWORKSPACE-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "devworkspace/devworkspace-operator-bundle@sha256:1600c0fd5a6810f02ccb1440f5e03731b38891983d2a2fb13aa332bbc433eeaf_amd64 as a component of Devworkspace 1.0 for RHEL 8", "product_id": "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-operator-bundle@sha256:1600c0fd5a6810f02ccb1440f5e03731b38891983d2a2fb13aa332bbc433eeaf_amd64" }, "product_reference": "devworkspace/devworkspace-operator-bundle@sha256:1600c0fd5a6810f02ccb1440f5e03731b38891983d2a2fb13aa332bbc433eeaf_amd64", "relates_to_product_reference": "8Base-DEVWORKSPACE-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "devworkspace/devworkspace-operator-bundle@sha256:1c1c2245d70ad787b537bcdde2742d39dd1171809d5b459ffea82630da9a51a9_s390x as a component of Devworkspace 1.0 for RHEL 8", "product_id": "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-operator-bundle@sha256:1c1c2245d70ad787b537bcdde2742d39dd1171809d5b459ffea82630da9a51a9_s390x" }, "product_reference": "devworkspace/devworkspace-operator-bundle@sha256:1c1c2245d70ad787b537bcdde2742d39dd1171809d5b459ffea82630da9a51a9_s390x", "relates_to_product_reference": "8Base-DEVWORKSPACE-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "devworkspace/devworkspace-project-clone-rhel8@sha256:2d4e1ecf7d0a9968b84d1453838a23619d8d0be32b2352275b5931e070e90c42_s390x as a component of Devworkspace 1.0 for RHEL 8", "product_id": "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-project-clone-rhel8@sha256:2d4e1ecf7d0a9968b84d1453838a23619d8d0be32b2352275b5931e070e90c42_s390x" }, "product_reference": "devworkspace/devworkspace-project-clone-rhel8@sha256:2d4e1ecf7d0a9968b84d1453838a23619d8d0be32b2352275b5931e070e90c42_s390x", "relates_to_product_reference": "8Base-DEVWORKSPACE-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "devworkspace/devworkspace-project-clone-rhel8@sha256:3bd91ebeab17e83e2e2477211c4a113808549dbd5b59fdc35fd2ec5c8e2a8ecc_ppc64le as a component of Devworkspace 1.0 for RHEL 8", "product_id": "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-project-clone-rhel8@sha256:3bd91ebeab17e83e2e2477211c4a113808549dbd5b59fdc35fd2ec5c8e2a8ecc_ppc64le" }, "product_reference": "devworkspace/devworkspace-project-clone-rhel8@sha256:3bd91ebeab17e83e2e2477211c4a113808549dbd5b59fdc35fd2ec5c8e2a8ecc_ppc64le", "relates_to_product_reference": "8Base-DEVWORKSPACE-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "devworkspace/devworkspace-project-clone-rhel8@sha256:d41c9571370906141c551246fc22ad16d716bf3f4bc183b90c280e4e435d9a15_amd64 as a component of Devworkspace 1.0 for RHEL 8", "product_id": "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-project-clone-rhel8@sha256:d41c9571370906141c551246fc22ad16d716bf3f4bc183b90c280e4e435d9a15_amd64" }, "product_reference": "devworkspace/devworkspace-project-clone-rhel8@sha256:d41c9571370906141c551246fc22ad16d716bf3f4bc183b90c280e4e435d9a15_amd64", "relates_to_product_reference": "8Base-DEVWORKSPACE-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "devworkspace/devworkspace-rhel8-operator@sha256:41a0aaa72619f526934d08cd8191ea998cabc58b1bea8b8fcadd7bdb0fe173e7_amd64 as a component of Devworkspace 1.0 for RHEL 8", "product_id": "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-rhel8-operator@sha256:41a0aaa72619f526934d08cd8191ea998cabc58b1bea8b8fcadd7bdb0fe173e7_amd64" }, "product_reference": "devworkspace/devworkspace-rhel8-operator@sha256:41a0aaa72619f526934d08cd8191ea998cabc58b1bea8b8fcadd7bdb0fe173e7_amd64", "relates_to_product_reference": "8Base-DEVWORKSPACE-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "devworkspace/devworkspace-rhel8-operator@sha256:94ba245d62074146b89252df5cc0d6456e674ed324e8ebec72c8f9821b6fbca8_ppc64le as a component of Devworkspace 1.0 for RHEL 8", "product_id": "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-rhel8-operator@sha256:94ba245d62074146b89252df5cc0d6456e674ed324e8ebec72c8f9821b6fbca8_ppc64le" }, "product_reference": "devworkspace/devworkspace-rhel8-operator@sha256:94ba245d62074146b89252df5cc0d6456e674ed324e8ebec72c8f9821b6fbca8_ppc64le", "relates_to_product_reference": "8Base-DEVWORKSPACE-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "devworkspace/devworkspace-rhel8-operator@sha256:e4ab2900e371c2533e28ec6a587e08a8143ef95cde2d8003a3490b0c4b23b152_s390x as a component of Devworkspace 1.0 for RHEL 8", "product_id": "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-rhel8-operator@sha256:e4ab2900e371c2533e28ec6a587e08a8143ef95cde2d8003a3490b0c4b23b152_s390x" }, "product_reference": "devworkspace/devworkspace-rhel8-operator@sha256:e4ab2900e371c2533e28ec6a587e08a8143ef95cde2d8003a3490b0c4b23b152_s390x", "relates_to_product_reference": "8Base-DEVWORKSPACE-1.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "David Benoit" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2023-3089", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2023-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2212085" } ], "notes": [ { "category": "description", "text": "A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.", "title": "Vulnerability description" }, { "category": "summary", "text": "openshift: OCP \u0026 FIPS mode", "title": "Vulnerability summary" }, { "category": "other", "text": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-001\n\nThe static scanning tool (to verify your system is once again compliant with FIPS) is available here https://github.com/openshift/check-payload", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-operator-bundle@sha256:0090f19f2409c98b61dea57f905d355591ea5a554bf89e1d5accea6830b38be6_ppc64le", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-operator-bundle@sha256:1600c0fd5a6810f02ccb1440f5e03731b38891983d2a2fb13aa332bbc433eeaf_amd64", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-operator-bundle@sha256:1c1c2245d70ad787b537bcdde2742d39dd1171809d5b459ffea82630da9a51a9_s390x", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-project-clone-rhel8@sha256:2d4e1ecf7d0a9968b84d1453838a23619d8d0be32b2352275b5931e070e90c42_s390x", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-project-clone-rhel8@sha256:3bd91ebeab17e83e2e2477211c4a113808549dbd5b59fdc35fd2ec5c8e2a8ecc_ppc64le", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-project-clone-rhel8@sha256:d41c9571370906141c551246fc22ad16d716bf3f4bc183b90c280e4e435d9a15_amd64", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-rhel8-operator@sha256:41a0aaa72619f526934d08cd8191ea998cabc58b1bea8b8fcadd7bdb0fe173e7_amd64", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-rhel8-operator@sha256:94ba245d62074146b89252df5cc0d6456e674ed324e8ebec72c8f9821b6fbca8_ppc64le", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-rhel8-operator@sha256:e4ab2900e371c2533e28ec6a587e08a8143ef95cde2d8003a3490b0c4b23b152_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-3089" }, { "category": "external", "summary": "RHBZ#2212085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212085" }, { "category": "external", "summary": "RHSB-2023-001", "url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-001" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-3089", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3089" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3089", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3089" } ], "release_date": "2023-07-05T12:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-25T18:31:29+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-operator-bundle@sha256:0090f19f2409c98b61dea57f905d355591ea5a554bf89e1d5accea6830b38be6_ppc64le", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-operator-bundle@sha256:1600c0fd5a6810f02ccb1440f5e03731b38891983d2a2fb13aa332bbc433eeaf_amd64", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-operator-bundle@sha256:1c1c2245d70ad787b537bcdde2742d39dd1171809d5b459ffea82630da9a51a9_s390x", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-project-clone-rhel8@sha256:2d4e1ecf7d0a9968b84d1453838a23619d8d0be32b2352275b5931e070e90c42_s390x", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-project-clone-rhel8@sha256:3bd91ebeab17e83e2e2477211c4a113808549dbd5b59fdc35fd2ec5c8e2a8ecc_ppc64le", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-project-clone-rhel8@sha256:d41c9571370906141c551246fc22ad16d716bf3f4bc183b90c280e4e435d9a15_amd64", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-rhel8-operator@sha256:41a0aaa72619f526934d08cd8191ea998cabc58b1bea8b8fcadd7bdb0fe173e7_amd64", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-rhel8-operator@sha256:94ba245d62074146b89252df5cc0d6456e674ed324e8ebec72c8f9821b6fbca8_ppc64le", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-rhel8-operator@sha256:e4ab2900e371c2533e28ec6a587e08a8143ef95cde2d8003a3490b0c4b23b152_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4276" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected packages as soon as possible.", "product_ids": [ "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-operator-bundle@sha256:0090f19f2409c98b61dea57f905d355591ea5a554bf89e1d5accea6830b38be6_ppc64le", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-operator-bundle@sha256:1600c0fd5a6810f02ccb1440f5e03731b38891983d2a2fb13aa332bbc433eeaf_amd64", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-operator-bundle@sha256:1c1c2245d70ad787b537bcdde2742d39dd1171809d5b459ffea82630da9a51a9_s390x", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-project-clone-rhel8@sha256:2d4e1ecf7d0a9968b84d1453838a23619d8d0be32b2352275b5931e070e90c42_s390x", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-project-clone-rhel8@sha256:3bd91ebeab17e83e2e2477211c4a113808549dbd5b59fdc35fd2ec5c8e2a8ecc_ppc64le", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-project-clone-rhel8@sha256:d41c9571370906141c551246fc22ad16d716bf3f4bc183b90c280e4e435d9a15_amd64", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-rhel8-operator@sha256:41a0aaa72619f526934d08cd8191ea998cabc58b1bea8b8fcadd7bdb0fe173e7_amd64", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-rhel8-operator@sha256:94ba245d62074146b89252df5cc0d6456e674ed324e8ebec72c8f9821b6fbca8_ppc64le", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-rhel8-operator@sha256:e4ab2900e371c2533e28ec6a587e08a8143ef95cde2d8003a3490b0c4b23b152_s390x" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-operator-bundle@sha256:0090f19f2409c98b61dea57f905d355591ea5a554bf89e1d5accea6830b38be6_ppc64le", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-operator-bundle@sha256:1600c0fd5a6810f02ccb1440f5e03731b38891983d2a2fb13aa332bbc433eeaf_amd64", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-operator-bundle@sha256:1c1c2245d70ad787b537bcdde2742d39dd1171809d5b459ffea82630da9a51a9_s390x", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-project-clone-rhel8@sha256:2d4e1ecf7d0a9968b84d1453838a23619d8d0be32b2352275b5931e070e90c42_s390x", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-project-clone-rhel8@sha256:3bd91ebeab17e83e2e2477211c4a113808549dbd5b59fdc35fd2ec5c8e2a8ecc_ppc64le", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-project-clone-rhel8@sha256:d41c9571370906141c551246fc22ad16d716bf3f4bc183b90c280e4e435d9a15_amd64", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-rhel8-operator@sha256:41a0aaa72619f526934d08cd8191ea998cabc58b1bea8b8fcadd7bdb0fe173e7_amd64", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-rhel8-operator@sha256:94ba245d62074146b89252df5cc0d6456e674ed324e8ebec72c8f9821b6fbca8_ppc64le", "8Base-DEVWORKSPACE-1.0:devworkspace/devworkspace-rhel8-operator@sha256:e4ab2900e371c2533e28ec6a587e08a8143ef95cde2d8003a3490b0c4b23b152_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openshift: OCP \u0026 FIPS mode" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.