First published: Tue Sep 13 2022(Updated: )
The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.<br>Security Fix(es):<br><li> nodejs-url-parse: authorization bypass through user-controlled key (CVE-2022-0512)</li> <li> npm-url-parse: Authorization bypass through user-controlled key (CVE-2022-0686)</li> <li> npm-url-parse: authorization bypass through user-controlled key (CVE-2022-0691)</li> <li> eventsource: Exposure of Sensitive Information (CVE-2022-1650)</li> <li> nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions (CVE-2020-28500)</li> <li> nodejs-lodash: command injection via template (CVE-2021-23337)</li> <li> npm-url-parse: Authorization Bypass Through User-Controlled Key (CVE-2022-0639)</li> <li> golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:6429 is classified as important.
To fix RHSA-2022:6429, update to the latest version of the Migration Toolkit for Containers.
RHSA-2022:6429 affects the Migration Toolkit for Containers and its dependencies, including nodejs-url-parse.
RHSA-2022:6429 addresses multiple security vulnerabilities related to the nodejs-url-parse package.
Yes, applying RHSA-2022:6429 is critical for maintaining Kubernetes security and protecting against potential exploitation.