First published: Thu Aug 01 2024(Updated: )
Errata Advisory for Red Hat OpenShift GitOps v1.11.7.<br>Security Fix(es):<br><li> openshift-gitops-argocd-container: Unauthenticated Denial of Service (DoS) Vulnerability via /api/webhook Endpoint in Argo CD [gitops-1.11](CVE-2024-40634)</li> <li> openshift-gitops-container: Argo CD web terminal session doesn't expire [gitops-1.11](CVE-2023-40025)</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat OpenShift GitOps for IBM Z and LinuxONE | ||
Red Hat Red Hat OpenShift GitOps | ||
Red Hat Red Hat OpenShift GitOps for ARM 64 | ||
Red Hat Red Hat OpenShift GitOps for IBM Power, little endian |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2024:4972 addresses an unauthenticated Denial of Service (DoS) vulnerability via the /api/webhook endpoint in Argo CD (CVE-2024-40634).
The severity of RHSA-2024:4972 is classified as important according to Red Hat's security advisory guidelines.
RHSA-2024:4972 affects several versions of Red Hat OpenShift GitOps including v1.11.7 for various architectures.
To mitigate the vulnerabilities detailed in RHSA-2024:4972, it is recommended to update to the patched version of the software provided in the advisory.
Yes, the fix for the vulnerabilities in RHSA-2024:4972 typically involves updating to the latest secure version of Red Hat OpenShift GitOps as indicated in the advisory.