First published: Wed May 11 2022(Updated: )
Release osp-director-operator images<br>Security Fix(es):<br><li> golang: kubernetes: YAML parsing vulnerable to "Billion Laughs" attack, allowing for remote (CVE-2019-11253)</li> <li> golang: golang-github-miekg-dns: predictable TXID can lead to response forgeries (CVE-2019-19794)</li> <li> golang: containerd: unrestricted access to abstract Unix domain socket can lead to privileges (CVE-2020-15257)</li> <li> golang: ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)</li> <li> golang: containerd: pulling and extracting crafted container image may result in Unix file permission changes (CVE-2021-32760)</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:2183 is considered important due to vulnerabilities that could lead to remote code execution.
To fix RHSA-2022:2183, update your golang and golang-github-miekg-dns packages to the latest patched versions.
RHSA-2022:2183 addresses CVE-2019-11253, which is related to YAML parsing vulnerabilities, and CVE-2019-19794, concerning predictable TXID leading to response forgeries.
RHSA-2022:2183 is applicable to users of the affected golang components, specifically those using vulnerable versions.
If RHSA-2022:2183 is not remediated, systems may become susceptible to remote attacks that exploit these vulnerabilities.