First published: Thu Aug 01 2024(Updated: )
Errata Advisory for Red Hat OpenShift GitOps v1.12.5.<br>Security Fix(es):<br><li> openshift-gitops-argocd-container: Unauthenticated Denial of Service</li> Vulnerability via /api/webhook Endpoint in Argo CD [gitops-1.12](CVE-2024-40634)<br><li> openshift-gitops-container: Argo CD web terminal session doesn't expire [gitops-1.12](CVE-2023-40025)</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE page(s)<br>listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat OpenShift GitOps for ARM 64 | ||
Red Hat Red Hat OpenShift GitOps | ||
Red Hat Red Hat OpenShift GitOps for IBM Power, little endian | ||
Red Hat Red Hat OpenShift GitOps for IBM Z and LinuxONE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:4973 is classified as Important due to an unauthenticated denial of service vulnerability.
To fix RHSA-2024:4973, update your Red Hat OpenShift GitOps installation to the latest version where the vulnerability is patched.
RHSA-2024:4973 addresses an unauthenticated denial of service vulnerability via the /api/webhook endpoint in Argo CD.
The affected products by RHSA-2024:4973 include various versions of Red Hat OpenShift GitOps for ARM 64, IBM Power, IBM Z, and LinuxONE.
There are currently no official workarounds provided for RHSA-2024:4973, and the recommended action is to apply the necessary updates.