First published: Fri May 10 2024(Updated: )
Errata Advisory for Red Hat OpenShift GitOps v1.12.2.<br>Security Fix(es):<br><li> argo-cd: webpack-dev-middleware: lack of URL validation may lead to file leak (CVE-2024-29180).</li> <li> argo-cd: API server does not enforce project sourceNamespaces (CVE-2024-31990).</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>Bug Fix(es):<br>1. Fix for a critical bug reported by customers where IgnoreDifferences Option in Sync Options was not working for array fields in ArgoCD. This fix will allow the users to ignore specific fields in the array when specified in ignoreDifferences during Sync.<br>2. Added support for rollouts in gitops-must-gather which will allow customers to gather data and logs about their rollout installation.<br>3. A fix that enables customer to add clusters hosted on GCP to ArgoCD.<br>4. A fix to allow users to configure Notification Context in NotificationsConfigurationCR.<br>5. Another fix to enable scheduling console-plugin workloads on Infra nodes.<br>6. A fix to resolve customer bug which will now allow the users to create ArgoCD from Developer Console.<br>7. An important customer fix that ensures that Argo CD correctly reports support for these host key algorithms during the handshake process, allowing the pull from Azure DevOps Repos to succeed.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat OpenShift GitOps for ARM 64 | ||
Red Hat Red Hat OpenShift GitOps for IBM Power, little endian | ||
Red Hat Red Hat OpenShift GitOps | ||
Red Hat Red Hat OpenShift GitOps for IBM Z and LinuxONE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2024:2816 addresses CVE-2024-29180, which involves a lack of URL validation leading to file leaks, and CVE-2024-31990, wherein the API server does not enforce project sourceNamespaces.
The severity of the vulnerabilities in RHSA-2024:2816 should be assessed based on the potential for unauthorized file access and the implications of sourceNamespace enforcement failure.
Users should update to the fixed versions of Red Hat OpenShift GitOps as detailed in the advisory to remediate the vulnerabilities listed in RHSA-2024:2816.
RHSA-2024:2816 affects various versions of Red Hat OpenShift GitOps including those for ARM 64, IBM Power, and IBM Z and LinuxONE.
Red Hat OpenShift GitOps users should apply the provided updates as soon as possible to address the vulnerabilities outlined in RHSA-2024:2816.