[RHSA-2023:1639-01] Moderate: OpenShift API for Data Protection (OADP) 1.1.3 security and bug fix update

Security announcements for all Red Hat products and services. rhsa-announce at redhat.com
Wed Apr 5 09:15:41 UTC 2023


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: OpenShift API for Data Protection (OADP) 1.1.3 security and bug fix update
Advisory ID:       RHSA-2023:1639-01
Product:           OpenShift API for Data Protection
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:1639
Issue date:        2023-04-05
CVE Names:         CVE-2022-41724 CVE-2022-41725 CVE-2023-23916 
=====================================================================

1. Summary:

OpenShift API for Data Protection (OADP) 1.1.3 is now available.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

OpenShift API for Data Protection (OADP) enables you to back up and restore
application resources, persistent volume data, and internal container
images to external backup storage. OADP enables both file system-based and
snapshot-based backups for persistent volumes.

Security Fix(es):

* golang: crypto/tls: large handshake records may cause panics
(CVE-2022-41724)

* golang: net/http, mime/multipart: denial of service from excessive
resource consumption (CVE-2022-41725)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2178488 - CVE-2022-41725 golang: net/http, mime/multipart: denial of service from excessive resource consumption
2178492 - CVE-2022-41724 golang: crypto/tls: large handshake records may cause panics

5. References:

https://access.redhat.com/security/cve/CVE-2022-41724
https://access.redhat.com/security/cve/CVE-2022-41725
https://access.redhat.com/security/cve/CVE-2023-23916
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=wnE7
-----END PGP SIGNATURE-----


More information about the RHSA-announce mailing list