RHSA-2023_4694
Vulnerability from csaf_redhat - Published: 2023-08-22 00:09 - Updated: 2024-11-22 23:27Summary
Red Hat Security Advisory: Release of containers for OSP 16.2.z (Train) director Operator
Notes
Topic
Red Hat OpenStack Platform (RHOSP) 16.2.z (Train) director Operator containers are now available.
Details
Release of Red Hat OpenStack Platform (RHOSP) 16.2.z (Train) provides these changes:
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenStack Platform (RHOSP) 16.2.z (Train) director Operator containers are now available.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenStack Platform (RHOSP) 16.2.z (Train) provides these changes:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:4694",
"url": "https://access.redhat.com/errata/RHSA-2023:4694"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/16.2/html/release_notes",
"url": "https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/16.2/html/release_notes"
},
{
"category": "external",
"summary": "2215317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215317"
},
{
"category": "external",
"summary": "2218300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218300"
},
{
"category": "external",
"summary": "2228513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228513"
},
{
"category": "external",
"summary": "2229173",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229173"
},
{
"category": "external",
"summary": "OSPK8-735",
"url": "https://issues.redhat.com/browse/OSPK8-735"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4694.json"
}
],
"title": "Red Hat Security Advisory: Release of containers for OSP 16.2.z (Train) director Operator",
"tracking": {
"current_release_date": "2024-11-22T23:27:15+00:00",
"generator": {
"date": "2024-11-22T23:27:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:4694",
"initial_release_date": "2023-08-22T00:09:37+00:00",
"revision_history": [
{
"date": "2023-08-22T00:09:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-08-22T00:09:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T23:27:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 16.2",
"product": {
"name": "Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.2::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosp-rhel8/osp-director-agent@sha256:435b11c52edc98da6f15e21da9fede79825a97b2ac6e5df738d7af77fadb4453_amd64",
"product": {
"name": "rhosp-rhel8/osp-director-agent@sha256:435b11c52edc98da6f15e21da9fede79825a97b2ac6e5df738d7af77fadb4453_amd64",
"product_id": "rhosp-rhel8/osp-director-agent@sha256:435b11c52edc98da6f15e21da9fede79825a97b2ac6e5df738d7af77fadb4453_amd64",
"product_identification_helper": {
"purl": "pkg:oci/osp-director-agent@sha256:435b11c52edc98da6f15e21da9fede79825a97b2ac6e5df738d7af77fadb4453?arch=amd64\u0026repository_url=registry.redhat.io/rhosp-rhel8/osp-director-agent\u0026tag=1.3.0-9"
}
}
},
{
"category": "product_version",
"name": "rhosp-rhel8/osp-director-downloader@sha256:7ab88acf3a7c1568b05ec08564a0930cc43a5dcf21ec774bc785bb50545f2b86_amd64",
"product": {
"name": "rhosp-rhel8/osp-director-downloader@sha256:7ab88acf3a7c1568b05ec08564a0930cc43a5dcf21ec774bc785bb50545f2b86_amd64",
"product_id": "rhosp-rhel8/osp-director-downloader@sha256:7ab88acf3a7c1568b05ec08564a0930cc43a5dcf21ec774bc785bb50545f2b86_amd64",
"product_identification_helper": {
"purl": "pkg:oci/osp-director-downloader@sha256:7ab88acf3a7c1568b05ec08564a0930cc43a5dcf21ec774bc785bb50545f2b86?arch=amd64\u0026repository_url=registry.redhat.io/rhosp-rhel8/osp-director-downloader\u0026tag=1.3.0-10"
}
}
},
{
"category": "product_version",
"name": "rhosp-rhel8/osp-director-operator-bundle@sha256:ebeb0f15e68d0200420e6b6b013116e550e8110c3038e4cc37e73dd38d3ed248_amd64",
"product": {
"name": "rhosp-rhel8/osp-director-operator-bundle@sha256:ebeb0f15e68d0200420e6b6b013116e550e8110c3038e4cc37e73dd38d3ed248_amd64",
"product_id": "rhosp-rhel8/osp-director-operator-bundle@sha256:ebeb0f15e68d0200420e6b6b013116e550e8110c3038e4cc37e73dd38d3ed248_amd64",
"product_identification_helper": {
"purl": "pkg:oci/osp-director-operator-bundle@sha256:ebeb0f15e68d0200420e6b6b013116e550e8110c3038e4cc37e73dd38d3ed248?arch=amd64\u0026repository_url=registry.redhat.io/rhosp-rhel8/osp-director-operator-bundle\u0026tag=1.3.0-17"
}
}
},
{
"category": "product_version",
"name": "rhosp-rhel8/osp-director-operator@sha256:1d06f2bdb1d80b843bc6f5c9b55009c003cb35cec8416c4da9983c48681769b5_amd64",
"product": {
"name": "rhosp-rhel8/osp-director-operator@sha256:1d06f2bdb1d80b843bc6f5c9b55009c003cb35cec8416c4da9983c48681769b5_amd64",
"product_id": "rhosp-rhel8/osp-director-operator@sha256:1d06f2bdb1d80b843bc6f5c9b55009c003cb35cec8416c4da9983c48681769b5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/osp-director-operator@sha256:1d06f2bdb1d80b843bc6f5c9b55009c003cb35cec8416c4da9983c48681769b5?arch=amd64\u0026repository_url=registry.redhat.io/rhosp-rhel8/osp-director-operator\u0026tag=1.3.0-8"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-rhel8/osp-director-agent@sha256:435b11c52edc98da6f15e21da9fede79825a97b2ac6e5df738d7af77fadb4453_amd64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:rhosp-rhel8/osp-director-agent@sha256:435b11c52edc98da6f15e21da9fede79825a97b2ac6e5df738d7af77fadb4453_amd64"
},
"product_reference": "rhosp-rhel8/osp-director-agent@sha256:435b11c52edc98da6f15e21da9fede79825a97b2ac6e5df738d7af77fadb4453_amd64",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-rhel8/osp-director-downloader@sha256:7ab88acf3a7c1568b05ec08564a0930cc43a5dcf21ec774bc785bb50545f2b86_amd64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:rhosp-rhel8/osp-director-downloader@sha256:7ab88acf3a7c1568b05ec08564a0930cc43a5dcf21ec774bc785bb50545f2b86_amd64"
},
"product_reference": "rhosp-rhel8/osp-director-downloader@sha256:7ab88acf3a7c1568b05ec08564a0930cc43a5dcf21ec774bc785bb50545f2b86_amd64",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-rhel8/osp-director-operator-bundle@sha256:ebeb0f15e68d0200420e6b6b013116e550e8110c3038e4cc37e73dd38d3ed248_amd64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:rhosp-rhel8/osp-director-operator-bundle@sha256:ebeb0f15e68d0200420e6b6b013116e550e8110c3038e4cc37e73dd38d3ed248_amd64"
},
"product_reference": "rhosp-rhel8/osp-director-operator-bundle@sha256:ebeb0f15e68d0200420e6b6b013116e550e8110c3038e4cc37e73dd38d3ed248_amd64",
"relates_to_product_reference": "8Base-RHOS-16.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosp-rhel8/osp-director-operator@sha256:1d06f2bdb1d80b843bc6f5c9b55009c003cb35cec8416c4da9983c48681769b5_amd64 as a component of Red Hat OpenStack Platform 16.2",
"product_id": "8Base-RHOS-16.2:rhosp-rhel8/osp-director-operator@sha256:1d06f2bdb1d80b843bc6f5c9b55009c003cb35cec8416c4da9983c48681769b5_amd64"
},
"product_reference": "rhosp-rhel8/osp-director-operator@sha256:1d06f2bdb1d80b843bc6f5c9b55009c003cb35cec8416c4da9983c48681769b5_amd64",
"relates_to_product_reference": "8Base-RHOS-16.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-21235",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2023-06-15T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOS-16.2:rhosp-rhel8/osp-director-agent@sha256:435b11c52edc98da6f15e21da9fede79825a97b2ac6e5df738d7af77fadb4453_amd64",
"8Base-RHOS-16.2:rhosp-rhel8/osp-director-downloader@sha256:7ab88acf3a7c1568b05ec08564a0930cc43a5dcf21ec774bc785bb50545f2b86_amd64",
"8Base-RHOS-16.2:rhosp-rhel8/osp-director-operator-bundle@sha256:ebeb0f15e68d0200420e6b6b013116e550e8110c3038e4cc37e73dd38d3ed248_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215317"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the VCS package, caused by improper validation of user-supplied input. By using a specially-crafted argument, a remote attacker could execute arbitrary commands on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/Masterminds/vcs: Command Injection via argument injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat OpenStack, the \u0027github.com/Masterminds/vcs\u0027 is a transitive dependency and is not used by operators directly which reduces the chances for successful exploitation. Hence, the impact for OpenStack is reduced to moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-16.2:rhosp-rhel8/osp-director-operator@sha256:1d06f2bdb1d80b843bc6f5c9b55009c003cb35cec8416c4da9983c48681769b5_amd64"
],
"known_not_affected": [
"8Base-RHOS-16.2:rhosp-rhel8/osp-director-agent@sha256:435b11c52edc98da6f15e21da9fede79825a97b2ac6e5df738d7af77fadb4453_amd64",
"8Base-RHOS-16.2:rhosp-rhel8/osp-director-downloader@sha256:7ab88acf3a7c1568b05ec08564a0930cc43a5dcf21ec774bc785bb50545f2b86_amd64",
"8Base-RHOS-16.2:rhosp-rhel8/osp-director-operator-bundle@sha256:ebeb0f15e68d0200420e6b6b013116e550e8110c3038e4cc37e73dd38d3ed248_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-21235"
},
{
"category": "external",
"summary": "RHBZ#2215317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215317"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21235"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21235",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21235"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMINDSVCS-2437078",
"url": "https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMASTERMINDSVCS-2437078"
}
],
"release_date": "2023-04-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-08-22T00:09:37+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-16.2:rhosp-rhel8/osp-director-operator@sha256:1d06f2bdb1d80b843bc6f5c9b55009c003cb35cec8416c4da9983c48681769b5_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4694"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOS-16.2:rhosp-rhel8/osp-director-operator@sha256:1d06f2bdb1d80b843bc6f5c9b55009c003cb35cec8416c4da9983c48681769b5_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "github.com/Masterminds/vcs: Command Injection via argument injection"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…