First published: Tue Feb 11 2025(Updated: )
Gatekeeper v3.17.1<br>Starting in v3.17.1, users can specify a `containerArguments` list of names<br>and values for both the audit and webhook configurations to be passed to<br>the respective deployment. These will be ignored if the argument has<br>already been set by the operator or specifies an argument listed in the<br>deny list.<br>Starting in v3.17.1, the following namespaces are exempt from admission<br>control:<br><li> kube-*</li> <li> multicluster-engine</li> <li> hypershift</li> <li> hive</li> <li> rhacs-operator</li> <li> open-cluster-*</li> <li> openshift-*</li> To disable the default exempt namespaces, set the namespaces you want on<br>the object.<br>Security fix(es):<br><li> golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback might cause authorization bypass in golang.org/x/crypto (CVE-2024-45337)</li> <li> golang.org/x/net/html: Non-linear parsing of case-insensitive content in</li> golang.org/x/net/html (CVE-2024-45338)<br>Additional Release Notes:<br><li> v3.17.0: </li> <a href="https://github.com/open-policy-agent/gatekeeper/releases/tag/v3.17.0" target="_blank">https://github.com/open-policy-agent/gatekeeper/releases/tag/v3.17.0</a> <li> v3.17.1: </li> <a href="https://github.com/open-policy-agent/gatekeeper/releases/tag/v3.17.1" target="_blank">https://github.com/open-policy-agent/gatekeeper/releases/tag/v3.17.1</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Gatekeeper |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1331 is categorized as moderate.
To fix RHSA-2025:1331, update to the latest version of Red Hat Gatekeeper.
RHSA-2025:1331 affects Gatekeeper version 3.17.1 and earlier.
RHSA-2025:1331 addresses the capability to specify `containerArguments` for audit and webhook configurations.
Yes, a restart of the affected services may be required after applying the fix for RHSA-2025:1331.