kerberos error: Generic error (see e-text)
Retrying operation in 10s. 10 retries remaining.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: openshift-gitops-kam security update
Advisory ID:       RHSA-2023:3229-01
Product:           Red Hat OpenShift GitOps
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:3229
Issue date:        2023-05-18
CVE Names:         CVE-2022-1996 
====================================================================
1. Summary:

An update for openshift-gitops-kam is now available for Red Hat OpenShift
GitOps 1.8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenShift GitOps 1.8 - aarch64, ppc64le, s390x, x86_64

3. Description:

Security Fix(es):

* go-restful: Authorization Bypass Through User-Controlled Key
(CVE-2022-1996)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2094982 - CVE-2022-1996 go-restful: Authorization Bypass Through User-Controlled Key

6. Package List:

Red Hat OpenShift GitOps 1.8:

Source:
openshift-gitops-kam-1.8.3-6.el8.src.rpm

aarch64:
openshift-gitops-kam-1.8.3-6.el8.aarch64.rpm

ppc64le:
openshift-gitops-kam-1.8.3-6.el8.ppc64le.rpm

s390x:
openshift-gitops-kam-1.8.3-6.el8.s390x.rpm

x86_64:
openshift-gitops-kam-1.8.3-6.el8.x86_64.rpm
openshift-gitops-kam-redistributable-1.8.3-6.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-1996
https://access.redhat.com/security/updates/classification/#important
https://docs.openshift.com/gitops/1.11/understanding_openshift_gitops/about-redhat-openshift-gitops.html

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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rsKr
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-3229:01 Important: openshift-gitops-kam security update

An update for openshift-gitops-kam is now available for Red Hat OpenShift GitOps 1.8

Summary

Security Fix(es):
* go-restful: Authorization Bypass Through User-Controlled Key (CVE-2022-1996)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2022-1996 https://access.redhat.com/security/updates/classification/#important https://docs.openshift.com/gitops/1.11/understanding_openshift_gitops/about-redhat-openshift-gitops.html

Package List

Red Hat OpenShift GitOps 1.8:
Source: openshift-gitops-kam-1.8.3-6.el8.src.rpm
aarch64: openshift-gitops-kam-1.8.3-6.el8.aarch64.rpm
ppc64le: openshift-gitops-kam-1.8.3-6.el8.ppc64le.rpm
s390x: openshift-gitops-kam-1.8.3-6.el8.s390x.rpm
x86_64: openshift-gitops-kam-1.8.3-6.el8.x86_64.rpm openshift-gitops-kam-redistributable-1.8.3-6.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2023:3229-01
Product: Red Hat OpenShift GitOps
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3229
Issued Date: : 2023-05-18
CVE Names: CVE-2022-1996

Topic

An update for openshift-gitops-kam is now available for Red Hat OpenShiftGitOps 1.8.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat OpenShift GitOps 1.8 - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

2094982 - CVE-2022-1996 go-restful: Authorization Bypass Through User-Controlled Key


Related News