rhsa-2025:9342
Vulnerability from csaf_redhat
Published
2025-06-23 02:54
Modified
2025-11-24 15:24
Summary
Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.8 security and bug fix update
Notes
Topic
The Migration Toolkit for Containers (MTC) 1.8.8 is now available.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.
Security Fix(es) from Bugzilla:
* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "The Migration Toolkit for Containers (MTC) 1.8.8 is now available.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.\n\nSecurity Fix(es) from Bugzilla:\n\n* net/http: Request smuggling due to acceptance of invalid chunked data in net/http (CVE-2025-22871)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:9342",
"url": "https://access.redhat.com/errata/RHSA-2025:9342"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2358493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358493"
},
{
"category": "external",
"summary": "MIG-1746",
"url": "https://issues.redhat.com/browse/MIG-1746"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_9342.json"
}
],
"title": "Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.8 security and bug fix update",
"tracking": {
"current_release_date": "2025-11-24T15:24:47+00:00",
"generator": {
"date": "2025-11-24T15:24:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:9342",
"initial_release_date": "2025-06-23T02:54:30+00:00",
"revision_history": [
{
"date": "2025-06-23T02:54:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-06-23T02:54:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-24T15:24:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "8Base-RHMTC-1.8",
"product": {
"name": "8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhmt:1.8::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Migration Toolkit"
},
{
"branches": [
{
"category": "product_version",
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:016c9a2ea635accf38c9d287aab9ea24a7633d11eecb758f479532536256e499_amd64",
"product": {
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:016c9a2ea635accf38c9d287aab9ea24a7633d11eecb758f479532536256e499_amd64",
"product_id": "rhmtc/openshift-migration-controller-rhel8@sha256:016c9a2ea635accf38c9d287aab9ea24a7633d11eecb758f479532536256e499_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-controller-rhel8@sha256:016c9a2ea635accf38c9d287aab9ea24a7633d11eecb758f479532536256e499?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-controller-rhel8\u0026tag=v1.8.8-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:3325cb9b14420a87e190ec46951a6a1d9023210f3993510b821e4c7001b6b89e_amd64",
"product": {
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:3325cb9b14420a87e190ec46951a6a1d9023210f3993510b821e4c7001b6b89e_amd64",
"product_id": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:3325cb9b14420a87e190ec46951a6a1d9023210f3993510b821e4c7001b6b89e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-hook-runner-rhel8@sha256:3325cb9b14420a87e190ec46951a6a1d9023210f3993510b821e4c7001b6b89e?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-hook-runner-rhel8\u0026tag=v1.8.8-1"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:a62ebc238470d6b6f7d4ce8bb65531df52e21b121878e82a6908bfa03b19842a_amd64",
"product": {
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:a62ebc238470d6b6f7d4ce8bb65531df52e21b121878e82a6908bfa03b19842a_amd64",
"product_id": "rhmtc/openshift-migration-log-reader-rhel8@sha256:a62ebc238470d6b6f7d4ce8bb65531df52e21b121878e82a6908bfa03b19842a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-log-reader-rhel8@sha256:a62ebc238470d6b6f7d4ce8bb65531df52e21b121878e82a6908bfa03b19842a?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-log-reader-rhel8\u0026tag=v1.8.8-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:fc5e95a995a1525b660169f12e0e66295b97e9313c0afc4a66c058b3b98c127a_amd64",
"product": {
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:fc5e95a995a1525b660169f12e0e66295b97e9313c0afc4a66c058b3b98c127a_amd64",
"product_id": "rhmtc/openshift-migration-must-gather-rhel8@sha256:fc5e95a995a1525b660169f12e0e66295b97e9313c0afc4a66c058b3b98c127a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-must-gather-rhel8@sha256:fc5e95a995a1525b660169f12e0e66295b97e9313c0afc4a66c058b3b98c127a?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-must-gather-rhel8\u0026tag=v1.8.8-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:4e723281336b7472b7c4bfe1efd01669ebe95736aa25361c0673fc17aeb7ec01_amd64",
"product": {
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:4e723281336b7472b7c4bfe1efd01669ebe95736aa25361c0673fc17aeb7ec01_amd64",
"product_id": "rhmtc/openshift-migration-openvpn-rhel8@sha256:4e723281336b7472b7c4bfe1efd01669ebe95736aa25361c0673fc17aeb7ec01_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-openvpn-rhel8@sha256:4e723281336b7472b7c4bfe1efd01669ebe95736aa25361c0673fc17aeb7ec01?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-openvpn-rhel8\u0026tag=v1.8.8-1"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:418763c8f99d05ffef10a5b71a11c01f91883b070b0d9e810295f2cf19782bd7_amd64",
"product": {
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:418763c8f99d05ffef10a5b71a11c01f91883b070b0d9e810295f2cf19782bd7_amd64",
"product_id": "rhmtc/openshift-migration-rhel8-operator@sha256:418763c8f99d05ffef10a5b71a11c01f91883b070b0d9e810295f2cf19782bd7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-rhel8-operator@sha256:418763c8f99d05ffef10a5b71a11c01f91883b070b0d9e810295f2cf19782bd7?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rhel8-operator\u0026tag=v1.8.8-1"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-operator-bundle@sha256:888c9d8ff6c212eaeb6bb22c0c35755018a6ec932ec67b152f16a139beeb5d0b_amd64",
"product": {
"name": "rhmtc/openshift-migration-operator-bundle@sha256:888c9d8ff6c212eaeb6bb22c0c35755018a6ec932ec67b152f16a139beeb5d0b_amd64",
"product_id": "rhmtc/openshift-migration-operator-bundle@sha256:888c9d8ff6c212eaeb6bb22c0c35755018a6ec932ec67b152f16a139beeb5d0b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-operator-bundle@sha256:888c9d8ff6c212eaeb6bb22c0c35755018a6ec932ec67b152f16a139beeb5d0b?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-operator-bundle\u0026tag=v1.8.8-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:0a0571a29dd1c2e37b43889a875babecda836ab04758562a98d7720b6d7f4dc6_amd64",
"product": {
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:0a0571a29dd1c2e37b43889a875babecda836ab04758562a98d7720b6d7f4dc6_amd64",
"product_id": "rhmtc/openshift-migration-registry-rhel8@sha256:0a0571a29dd1c2e37b43889a875babecda836ab04758562a98d7720b6d7f4dc6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-registry-rhel8@sha256:0a0571a29dd1c2e37b43889a875babecda836ab04758562a98d7720b6d7f4dc6?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-registry-rhel8\u0026tag=v1.8.8-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc85ce914f59f3dc839a6d23dca15579b69590f0766ed0ab3b20539b88357e02_amd64",
"product": {
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc85ce914f59f3dc839a6d23dca15579b69590f0766ed0ab3b20539b88357e02_amd64",
"product_id": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc85ce914f59f3dc839a6d23dca15579b69590f0766ed0ab3b20539b88357e02_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-rsync-transfer-rhel8@sha256:cc85ce914f59f3dc839a6d23dca15579b69590f0766ed0ab3b20539b88357e02?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rsync-transfer-rhel8\u0026tag=v1.8.8-2"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:a0144fa59fc0802f509dd281d3d8da7bfc3067168bfbc4c158c7c67a327aa905_amd64",
"product": {
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:a0144fa59fc0802f509dd281d3d8da7bfc3067168bfbc4c158c7c67a327aa905_amd64",
"product_id": "rhmtc/openshift-migration-ui-rhel8@sha256:a0144fa59fc0802f509dd281d3d8da7bfc3067168bfbc4c158c7c67a327aa905_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-ui-rhel8@sha256:a0144fa59fc0802f509dd281d3d8da7bfc3067168bfbc4c158c7c67a327aa905?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-ui-rhel8\u0026tag=v1.8.8-1"
}
}
},
{
"category": "product_version",
"name": "rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:fe4e73c0eb63a8e698b6cc19a9912aa2ef3216268b2de9f8fc4ed7b2d137d507_amd64",
"product": {
"name": "rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:fe4e73c0eb63a8e698b6cc19a9912aa2ef3216268b2de9f8fc4ed7b2d137d507_amd64",
"product_id": "rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:fe4e73c0eb63a8e698b6cc19a9912aa2ef3216268b2de9f8fc4ed7b2d137d507_amd64",
"product_identification_helper": {
"purl": "pkg:oci/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:fe4e73c0eb63a8e698b6cc19a9912aa2ef3216268b2de9f8fc4ed7b2d137d507?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8\u0026tag=v1.8.8-2"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-controller-rhel8@sha256:016c9a2ea635accf38c9d287aab9ea24a7633d11eecb758f479532536256e499_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:016c9a2ea635accf38c9d287aab9ea24a7633d11eecb758f479532536256e499_amd64"
},
"product_reference": "rhmtc/openshift-migration-controller-rhel8@sha256:016c9a2ea635accf38c9d287aab9ea24a7633d11eecb758f479532536256e499_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:3325cb9b14420a87e190ec46951a6a1d9023210f3993510b821e4c7001b6b89e_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:3325cb9b14420a87e190ec46951a6a1d9023210f3993510b821e4c7001b6b89e_amd64"
},
"product_reference": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:3325cb9b14420a87e190ec46951a6a1d9023210f3993510b821e4c7001b6b89e_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:a62ebc238470d6b6f7d4ce8bb65531df52e21b121878e82a6908bfa03b19842a_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:a62ebc238470d6b6f7d4ce8bb65531df52e21b121878e82a6908bfa03b19842a_amd64"
},
"product_reference": "rhmtc/openshift-migration-log-reader-rhel8@sha256:a62ebc238470d6b6f7d4ce8bb65531df52e21b121878e82a6908bfa03b19842a_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:fc5e95a995a1525b660169f12e0e66295b97e9313c0afc4a66c058b3b98c127a_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:fc5e95a995a1525b660169f12e0e66295b97e9313c0afc4a66c058b3b98c127a_amd64"
},
"product_reference": "rhmtc/openshift-migration-must-gather-rhel8@sha256:fc5e95a995a1525b660169f12e0e66295b97e9313c0afc4a66c058b3b98c127a_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:4e723281336b7472b7c4bfe1efd01669ebe95736aa25361c0673fc17aeb7ec01_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:4e723281336b7472b7c4bfe1efd01669ebe95736aa25361c0673fc17aeb7ec01_amd64"
},
"product_reference": "rhmtc/openshift-migration-openvpn-rhel8@sha256:4e723281336b7472b7c4bfe1efd01669ebe95736aa25361c0673fc17aeb7ec01_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-operator-bundle@sha256:888c9d8ff6c212eaeb6bb22c0c35755018a6ec932ec67b152f16a139beeb5d0b_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:888c9d8ff6c212eaeb6bb22c0c35755018a6ec932ec67b152f16a139beeb5d0b_amd64"
},
"product_reference": "rhmtc/openshift-migration-operator-bundle@sha256:888c9d8ff6c212eaeb6bb22c0c35755018a6ec932ec67b152f16a139beeb5d0b_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-registry-rhel8@sha256:0a0571a29dd1c2e37b43889a875babecda836ab04758562a98d7720b6d7f4dc6_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:0a0571a29dd1c2e37b43889a875babecda836ab04758562a98d7720b6d7f4dc6_amd64"
},
"product_reference": "rhmtc/openshift-migration-registry-rhel8@sha256:0a0571a29dd1c2e37b43889a875babecda836ab04758562a98d7720b6d7f4dc6_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-rhel8-operator@sha256:418763c8f99d05ffef10a5b71a11c01f91883b070b0d9e810295f2cf19782bd7_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:418763c8f99d05ffef10a5b71a11c01f91883b070b0d9e810295f2cf19782bd7_amd64"
},
"product_reference": "rhmtc/openshift-migration-rhel8-operator@sha256:418763c8f99d05ffef10a5b71a11c01f91883b070b0d9e810295f2cf19782bd7_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc85ce914f59f3dc839a6d23dca15579b69590f0766ed0ab3b20539b88357e02_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc85ce914f59f3dc839a6d23dca15579b69590f0766ed0ab3b20539b88357e02_amd64"
},
"product_reference": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc85ce914f59f3dc839a6d23dca15579b69590f0766ed0ab3b20539b88357e02_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-ui-rhel8@sha256:a0144fa59fc0802f509dd281d3d8da7bfc3067168bfbc4c158c7c67a327aa905_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:a0144fa59fc0802f509dd281d3d8da7bfc3067168bfbc4c158c7c67a327aa905_amd64"
},
"product_reference": "rhmtc/openshift-migration-ui-rhel8@sha256:a0144fa59fc0802f509dd281d3d8da7bfc3067168bfbc4c158c7c67a327aa905_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:fe4e73c0eb63a8e698b6cc19a9912aa2ef3216268b2de9f8fc4ed7b2d137d507_amd64 as a component of 8Base-RHMTC-1.8",
"product_id": "8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:fe4e73c0eb63a8e698b6cc19a9912aa2ef3216268b2de9f8fc4ed7b2d137d507_amd64"
},
"product_reference": "rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:fe4e73c0eb63a8e698b6cc19a9912aa2ef3216268b2de9f8fc4ed7b2d137d507_amd64",
"relates_to_product_reference": "8Base-RHMTC-1.8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22871",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2025-04-08T21:01:32.229479+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:016c9a2ea635accf38c9d287aab9ea24a7633d11eecb758f479532536256e499_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:3325cb9b14420a87e190ec46951a6a1d9023210f3993510b821e4c7001b6b89e_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:a62ebc238470d6b6f7d4ce8bb65531df52e21b121878e82a6908bfa03b19842a_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:fc5e95a995a1525b660169f12e0e66295b97e9313c0afc4a66c058b3b98c127a_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:4e723281336b7472b7c4bfe1efd01669ebe95736aa25361c0673fc17aeb7ec01_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:888c9d8ff6c212eaeb6bb22c0c35755018a6ec932ec67b152f16a139beeb5d0b_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:418763c8f99d05ffef10a5b71a11c01f91883b070b0d9e810295f2cf19782bd7_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc85ce914f59f3dc839a6d23dca15579b69590f0766ed0ab3b20539b88357e02_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:a0144fa59fc0802f509dd281d3d8da7bfc3067168bfbc4c158c7c67a327aa905_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:fe4e73c0eb63a8e698b6cc19a9912aa2ef3216268b2de9f8fc4ed7b2d137d507_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2358493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the net/http golang package. The net/http package incorrectly accepts messages that end with a line feed (LF) instead of the proper line ending. When used with another server that also misinterprets this, it can lead to request smuggling\u2014where an attacker tricks the system to send hidden or unauthorized requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "net/http: Request smuggling due to acceptance of invalid chunked data in net/http",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite includes affected component however product is not directly impacted since the vulnerability arises when \"net/http\" is used as a server. Satellite uses it solely as a client, so it\u0027s not exposed to the flaw. Product Security has assessed this as Low severity.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-444: Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform uses secure, encrypted HTTPS connections over TLS 1.2 to reduce the risk of smuggling attacks by preventing the injection of ambiguous or malformed requests between components. The environment employs IPS/IDS and antimalware solutions to detect and block malicious code while ensuring consistent interpretation of HTTP requests across network layers, mitigating request/response inconsistencies. Event logs are collected and analyzed for centralization, correlation, monitoring, alerting, and retention, enabling the detection of malformed or suspicious HTTP traffic. Static code analysis and peer reviews enforce strong input validation and error handling to ensure all user inputs adhere to HTTP protocol specifications.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:0a0571a29dd1c2e37b43889a875babecda836ab04758562a98d7720b6d7f4dc6_amd64"
],
"known_not_affected": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:016c9a2ea635accf38c9d287aab9ea24a7633d11eecb758f479532536256e499_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:3325cb9b14420a87e190ec46951a6a1d9023210f3993510b821e4c7001b6b89e_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:a62ebc238470d6b6f7d4ce8bb65531df52e21b121878e82a6908bfa03b19842a_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:fc5e95a995a1525b660169f12e0e66295b97e9313c0afc4a66c058b3b98c127a_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:4e723281336b7472b7c4bfe1efd01669ebe95736aa25361c0673fc17aeb7ec01_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:888c9d8ff6c212eaeb6bb22c0c35755018a6ec932ec67b152f16a139beeb5d0b_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:418763c8f99d05ffef10a5b71a11c01f91883b070b0d9e810295f2cf19782bd7_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc85ce914f59f3dc839a6d23dca15579b69590f0766ed0ab3b20539b88357e02_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:a0144fa59fc0802f509dd281d3d8da7bfc3067168bfbc4c158c7c67a327aa905_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:fe4e73c0eb63a8e698b6cc19a9912aa2ef3216268b2de9f8fc4ed7b2d137d507_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22871"
},
{
"category": "external",
"summary": "RHBZ#2358493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22871"
},
{
"category": "external",
"summary": "https://go.dev/cl/652998",
"url": "https://go.dev/cl/652998"
},
{
"category": "external",
"summary": "https://go.dev/issue/71988",
"url": "https://go.dev/issue/71988"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/Y2uBTVKjBQk",
"url": "https://groups.google.com/g/golang-announce/c/Y2uBTVKjBQk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-3563",
"url": "https://pkg.go.dev/vuln/GO-2025-3563"
}
],
"release_date": "2025-04-08T20:04:34.769000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-06-23T02:54:30+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:0a0571a29dd1c2e37b43889a875babecda836ab04758562a98d7720b6d7f4dc6_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:9342"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:016c9a2ea635accf38c9d287aab9ea24a7633d11eecb758f479532536256e499_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:3325cb9b14420a87e190ec46951a6a1d9023210f3993510b821e4c7001b6b89e_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:a62ebc238470d6b6f7d4ce8bb65531df52e21b121878e82a6908bfa03b19842a_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:fc5e95a995a1525b660169f12e0e66295b97e9313c0afc4a66c058b3b98c127a_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:4e723281336b7472b7c4bfe1efd01669ebe95736aa25361c0673fc17aeb7ec01_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:888c9d8ff6c212eaeb6bb22c0c35755018a6ec932ec67b152f16a139beeb5d0b_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:0a0571a29dd1c2e37b43889a875babecda836ab04758562a98d7720b6d7f4dc6_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:418763c8f99d05ffef10a5b71a11c01f91883b070b0d9e810295f2cf19782bd7_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc85ce914f59f3dc839a6d23dca15579b69590f0766ed0ab3b20539b88357e02_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:a0144fa59fc0802f509dd281d3d8da7bfc3067168bfbc4c158c7c67a327aa905_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:fe4e73c0eb63a8e698b6cc19a9912aa2ef3216268b2de9f8fc4ed7b2d137d507_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-RHMTC-1.8:rhmtc/openshift-migration-controller-rhel8@sha256:016c9a2ea635accf38c9d287aab9ea24a7633d11eecb758f479532536256e499_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-hook-runner-rhel8@sha256:3325cb9b14420a87e190ec46951a6a1d9023210f3993510b821e4c7001b6b89e_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-log-reader-rhel8@sha256:a62ebc238470d6b6f7d4ce8bb65531df52e21b121878e82a6908bfa03b19842a_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-must-gather-rhel8@sha256:fc5e95a995a1525b660169f12e0e66295b97e9313c0afc4a66c058b3b98c127a_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-openvpn-rhel8@sha256:4e723281336b7472b7c4bfe1efd01669ebe95736aa25361c0673fc17aeb7ec01_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-operator-bundle@sha256:888c9d8ff6c212eaeb6bb22c0c35755018a6ec932ec67b152f16a139beeb5d0b_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-registry-rhel8@sha256:0a0571a29dd1c2e37b43889a875babecda836ab04758562a98d7720b6d7f4dc6_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rhel8-operator@sha256:418763c8f99d05ffef10a5b71a11c01f91883b070b0d9e810295f2cf19782bd7_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:cc85ce914f59f3dc839a6d23dca15579b69590f0766ed0ab3b20539b88357e02_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-ui-rhel8@sha256:a0144fa59fc0802f509dd281d3d8da7bfc3067168bfbc4c158c7c67a327aa905_amd64",
"8Base-RHMTC-1.8:rhmtc/openshift-migration-velero-plugin-for-mtc-rhel8@sha256:fe4e73c0eb63a8e698b6cc19a9912aa2ef3216268b2de9f8fc4ed7b2d137d507_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "net/http: Request smuggling due to acceptance of invalid chunked data in net/http"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…