First published: Tue Feb 11 2025(Updated: )
Gatekeeper v3.14.3<br>Starting in v3.14.3, users can specify a `containerArguments` list of names<br>and values for both the audit and webhook configurations to be passed to<br>the respective deployment. These will be ignored if the argument has<br>already been set by the operator or specifies an argument listed in the<br>deny list.<br>Starting in v3.14.3, the following namespaces are exempt from admission<br>control:<br><li> kube-*</li> <li> multicluster-engine</li> <li> hypershift</li> <li> hive</li> <li> rhacs-operator</li> <li> open-cluster-*</li> <li> openshift-*</li> To disable the default exempt namespaces, set the namespaces you want on<br>the object.<br>Security fix(es):<br><li> golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback might cause authorization bypass in golang.org/x/crypto (CVE-2024-45337)</li> <li> golang.org/x/net/html: Non-linear parsing of case-insensitive content in</li> golang.org/x/net/html (CVE-2024-45338)<br>Additional Release Notes:<br><li> v3.14.0 <a href="https://github.com/open-policy-agent/gatekeeper/releases/tag/v3.14.0" target="_blank">https://github.com/open-policy-agent/gatekeeper/releases/tag/v3.14.0</a></li> <li> v3.14.1 <a href="https://github.com/open-policy-agent/gatekeeper/releases/tag/v3.14.1" target="_blank">https://github.com/open-policy-agent/gatekeeper/releases/tag/v3.14.1</a></li> <li> v3.14.2 <a href="https://github.com/open-policy-agent/gatekeeper/releases/tag/v3.14.2" target="_blank">https://github.com/open-policy-agent/gatekeeper/releases/tag/v3.14.2</a></li>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Gatekeeper |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1333 is classified as moderate.
To fix RHSA-2025:1333, you should update your Red Hat Gatekeeper to version 3.14.3 or later.
RHSA-2025:1333 affects the Red Hat Gatekeeper product in version prior to 3.14.3.
RHSA-2025:1333 allows users to specify a 'containerArguments' list for audit and webhook configurations.
If you cannot update to version 3.14.3, consider reviewing your configurations and implementing any available workarounds for this vulnerability.