-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: Red Hat OpenShift GitOps security update
Advisory ID:       RHSA-2022:1039-01
Product:           Red Hat OpenShift GitOps
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:1039
Issue date:        2022-03-23
CVE Names:         CVE-2020-25709 CVE-2020-25710 CVE-2021-3999 
                   CVE-2021-23177 CVE-2021-31566 CVE-2021-45960 
                   CVE-2021-46143 CVE-2022-1025 CVE-2022-22822 
                   CVE-2022-22823 CVE-2022-22824 CVE-2022-22825 
                   CVE-2022-22826 CVE-2022-22827 CVE-2022-23218 
                   CVE-2022-23219 CVE-2022-23308 CVE-2022-23852 
                   CVE-2022-24407 CVE-2022-24730 CVE-2022-24731 
                   CVE-2022-25235 CVE-2022-25236 CVE-2022-25315 
====================================================================
1. Summary:

An update for openshift-gitops-applicationset-container,
openshift-gitops-container, openshift-gitops-kam-delivery-container, and
openshift-gitops-operator-container is now available for Red Hat OpenShift
GitOps 1.2. (GitOps v1.2.3)

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat Openshift GitOps is a declarative way to implement continuous
deployment for cloud native applications.

Security Fix(es):

* Openshift-Gitops: Improper access control allows admin privilege
escalation (CVE-2022-1025)

* argocd: path traversal and improper access control allows leaking
out-of-bound files (CVE-2022-24730)

* argocd: path traversal allows leaking out-of-bound files (CVE-2022-24731)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2062751 - CVE-2022-24730 argocd: path traversal and improper access control allows leaking out-of-bound files
2062755 - CVE-2022-24731 argocd: path traversal allows leaking out-of-bound files
2064682 - CVE-2022-1025 Openshift-Gitops: Improper access control allows admin privilege escalation

5. References:

https://access.redhat.com/security/cve/CVE-2020-25709
https://access.redhat.com/security/cve/CVE-2020-25710
https://access.redhat.com/security/cve/CVE-2021-3999
https://access.redhat.com/security/cve/CVE-2021-23177
https://access.redhat.com/security/cve/CVE-2021-31566
https://access.redhat.com/security/cve/CVE-2021-45960
https://access.redhat.com/security/cve/CVE-2021-46143
https://access.redhat.com/security/cve/CVE-2022-1025
https://access.redhat.com/security/cve/CVE-2022-22822
https://access.redhat.com/security/cve/CVE-2022-22823
https://access.redhat.com/security/cve/CVE-2022-22824
https://access.redhat.com/security/cve/CVE-2022-22825
https://access.redhat.com/security/cve/CVE-2022-22826
https://access.redhat.com/security/cve/CVE-2022-22827
https://access.redhat.com/security/cve/CVE-2022-23218
https://access.redhat.com/security/cve/CVE-2022-23219
https://access.redhat.com/security/cve/CVE-2022-23308
https://access.redhat.com/security/cve/CVE-2022-23852
https://access.redhat.com/security/cve/CVE-2022-24407
https://access.redhat.com/security/cve/CVE-2022-24730
https://access.redhat.com/security/cve/CVE-2022-24731
https://access.redhat.com/security/cve/CVE-2022-25235
https://access.redhat.com/security/cve/CVE-2022-25236
https://access.redhat.com/security/cve/CVE-2022-25315
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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6S1T
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-1039:01 Important: Red Hat OpenShift GitOps security

An update for openshift-gitops-applicationset-container, openshift-gitops-container, openshift-gitops-kam-delivery-container, and openshift-gitops-operator-container is now availab...

Summary

Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.
Security Fix(es):
* Openshift-Gitops: Improper access control allows admin privilege escalation (CVE-2022-1025)
* argocd: path traversal and improper access control allows leaking out-of-bound files (CVE-2022-24730)
* argocd: path traversal allows leaking out-of-bound files (CVE-2022-24731)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2020-25709 https://access.redhat.com/security/cve/CVE-2020-25710 https://access.redhat.com/security/cve/CVE-2021-3999 https://access.redhat.com/security/cve/CVE-2021-23177 https://access.redhat.com/security/cve/CVE-2021-31566 https://access.redhat.com/security/cve/CVE-2021-45960 https://access.redhat.com/security/cve/CVE-2021-46143 https://access.redhat.com/security/cve/CVE-2022-1025 https://access.redhat.com/security/cve/CVE-2022-22822 https://access.redhat.com/security/cve/CVE-2022-22823 https://access.redhat.com/security/cve/CVE-2022-22824 https://access.redhat.com/security/cve/CVE-2022-22825 https://access.redhat.com/security/cve/CVE-2022-22826 https://access.redhat.com/security/cve/CVE-2022-22827 https://access.redhat.com/security/cve/CVE-2022-23218 https://access.redhat.com/security/cve/CVE-2022-23219 https://access.redhat.com/security/cve/CVE-2022-23308 https://access.redhat.com/security/cve/CVE-2022-23852 https://access.redhat.com/security/cve/CVE-2022-24407 https://access.redhat.com/security/cve/CVE-2022-24730 https://access.redhat.com/security/cve/CVE-2022-24731 https://access.redhat.com/security/cve/CVE-2022-25235 https://access.redhat.com/security/cve/CVE-2022-25236 https://access.redhat.com/security/cve/CVE-2022-25315 https://access.redhat.com/security/updates/classification/#important

Package List


Severity
Advisory ID: RHSA-2022:1039-01
Product: Red Hat OpenShift GitOps
Advisory URL: https://access.redhat.com/errata/RHSA-2022:1039
Issued Date: : 2022-03-23
CVE Names: CVE-2020-25709 CVE-2020-25710 CVE-2021-3999 CVE-2021-23177 CVE-2021-31566 CVE-2021-45960 CVE-2021-46143 CVE-2022-1025 CVE-2022-22822 CVE-2022-22823 CVE-2022-22824 CVE-2022-22825 CVE-2022-22826 CVE-2022-22827 CVE-2022-23218 CVE-2022-23219 CVE-2022-23308 CVE-2022-23852 CVE-2022-24407 CVE-2022-24730 CVE-2022-24731 CVE-2022-25235 CVE-2022-25236 CVE-2022-25315

Topic

An update for openshift-gitops-applicationset-container,openshift-gitops-container, openshift-gitops-kam-delivery-container, andopenshift-gitops-operator-container is now available for Red Hat OpenShiftGitOps 1.2. (GitOps v1.2.3)Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2062751 - CVE-2022-24730 argocd: path traversal and improper access control allows leaking out-of-bound files

2062755 - CVE-2022-24731 argocd: path traversal allows leaking out-of-bound files

2064682 - CVE-2022-1025 Openshift-Gitops: Improper access control allows admin privilege escalation


Related News