-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Release of containers for Red Hat OpenStack Platform 17.1 director Operator
Advisory ID:       RHSA-2023:4582-01
Product:           Red Hat OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:4582
Issue date:        2023-08-16
CVE Names:         CVE-2022-21235 
=====================================================================

1. Summary:

Red Hat OpenStack Platform 17.1 (Wallaby) director Operator containers are
now available.

2. Description:

Release of Red Hat OpenStack Platform 17.1 (Wallaby) director Operator
containers provides these changes:

Security Fix(es):

* github.com/Masterminds/vcs: Command Injection via argument injection
(CVE-2022-21235)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2215019 - Update osp-director-operator references to GA locations
2215317 - CVE-2022-21235 github.com/Masterminds/vcs: Command Injection via argument injection
2218299 - git url logic does not handle non-default ports and users
2221326 - Playbooks list is ignored for FFU and minor update

5. JIRA issues fixed (https://issues.redhat.com/):

OSPK8-701 - nil ptr can hide actual error 

6. References:

https://access.redhat.com/security/cve/CVE-2022-21235
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/17.1/html/release_notes

7. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=s0iR
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-4582:01 Moderate: Release of containers for Red Hat

Red Hat OpenStack Platform 17.1 (Wallaby) director Operator containers are now available

Summary

Release of Red Hat OpenStack Platform 17.1 (Wallaby) director Operator containers provides these changes:
Security Fix(es):
* github.com/Masterminds/vcs: Command Injection via argument injection (CVE-2022-21235)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2022-21235 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/17.1/html/release_notes

Package List


Severity
Advisory ID: RHSA-2023:4582-01
Product: Red Hat OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2023:4582
Issued Date: : 2023-08-16
CVE Names: CVE-2022-21235

Topic

Red Hat OpenStack Platform 17.1 (Wallaby) director Operator containers arenow available.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2215019 - Update osp-director-operator references to GA locations

2215317 - CVE-2022-21235 github.com/Masterminds/vcs: Command Injection via argument injection

2218299 - git url logic does not handle non-default ports and users

2221326 - Playbooks list is ignored for FFU and minor update

5. JIRA issues fixed (https://issues.redhat.com/):

OSPK8-701 - nil ptr can hide actual error


Related News