Red Hat Security Advisory 2023-0918-01 - Service Binding manages the data plane for applications and backing services.
a4a0b61597e4539af186d0870a584294b79b29427a59239b69994540bab168ae
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Service Binding Operator security update
Advisory ID: RHSA-2023:0918-01
Product: OpenShift Developer Tools and Services
Advisory URL: https://access.redhat.com/errata/RHSA-2023:0918
Issue date: 2023-02-27
CVE Names: CVE-2021-46848 CVE-2022-1304 CVE-2022-22624
CVE-2022-22628 CVE-2022-22629 CVE-2022-22662
CVE-2022-26700 CVE-2022-26709 CVE-2022-26710
CVE-2022-26716 CVE-2022-26717 CVE-2022-26719
CVE-2022-30293 CVE-2022-35737 CVE-2022-40303
CVE-2022-40304 CVE-2022-41717 CVE-2022-42898
CVE-2022-47629
====================================================================
1. Summary:
An update for service-binding-operator-bundle-container and
service-binding-operator-container is now available for OpenShift Developer
Tools and Services for OCP 4.9.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Description:
Service Binding manages the data plane for applications and backing
services.
Security Fix(es):
* golang: net/http: An attacker can cause excessive memory growth in a Go
server accepting HTTP/2 requests (CVE-2022-41717)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
3. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
4. Bugs fixed (https://bugzilla.redhat.com/):
2161274 - CVE-2022-41717 golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests
5. JIRA issues fixed (https://issues.jboss.org/):
APPSVC-1204 - Provisioned Service discovery
APPSVC-1256 - CVE-2022-41717
6. References:
https://access.redhat.com/security/cve/CVE-2021-46848
https://access.redhat.com/security/cve/CVE-2022-1304
https://access.redhat.com/security/cve/CVE-2022-22624
https://access.redhat.com/security/cve/CVE-2022-22628
https://access.redhat.com/security/cve/CVE-2022-22629
https://access.redhat.com/security/cve/CVE-2022-22662
https://access.redhat.com/security/cve/CVE-2022-26700
https://access.redhat.com/security/cve/CVE-2022-26709
https://access.redhat.com/security/cve/CVE-2022-26710
https://access.redhat.com/security/cve/CVE-2022-26716
https://access.redhat.com/security/cve/CVE-2022-26717
https://access.redhat.com/security/cve/CVE-2022-26719
https://access.redhat.com/security/cve/CVE-2022-30293
https://access.redhat.com/security/cve/CVE-2022-35737
https://access.redhat.com/security/cve/CVE-2022-40303
https://access.redhat.com/security/cve/CVE-2022-40304
https://access.redhat.com/security/cve/CVE-2022-41717
https://access.redhat.com/security/cve/CVE-2022-42898
https://access.redhat.com/security/cve/CVE-2022-47629
https://access.redhat.com/security/updates/classification/#moderate
7. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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6W66
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce