First published: Wed May 29 2024(Updated: )
Errata Advisory for Red Hat OpenShift GitOps v1.11.5<br>Security Fix(es):<br><li> CVE-2024-31989 argocd: An update is now available for Red Hat OpenShift GitOps v1.11.5 to address the CVE-2024-31989, unprivileged pod in a different namespace on the same cluster could connect to the Redis server on port 6379.</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat OpenShift GitOps for IBM Z and LinuxONE | ||
Red Hat Red Hat OpenShift GitOps | ||
Red Hat Red Hat OpenShift GitOps for ARM 64 | ||
Red Hat Red Hat OpenShift GitOps for IBM Power, little endian |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:3475 is classified as important due to the potential security risks associated with unprivileged pod access.
To fix RHSA-2024:3475, you should update to Red Hat OpenShift GitOps v1.11.5 or later to address the vulnerability.
RHSA-2024:3475 addresses the vulnerability identified as CVE-2024-31989, which allows unprivileged pods in a different namespace to connect to the API server.
RHSA-2024:3475 affects multiple versions of Red Hat OpenShift GitOps, including the versions for IBM Z, IBM Power, and ARM 64.
Yes, a patch is available and can be applied by upgrading to the recommended version of Red Hat OpenShift GitOps.