First published: Wed Feb 26 2025(Updated: )
OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift DataFoundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multi-cloud data management service with an S3 compatible API.<br>Security Fix(es):<br><li> go-retryable<a href="http:" target="_blank">http:</a> url might write sensitive information to log file (CVE-2024-6104)</li> <li> node-gettext: Prototype Pollution (CVE-2024-21528)</li> <li> PostCSS: Improper input validation in PostCSS (CVE-2023-44270)</li> <li> golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto (CVE-2024-45337)</li> <li> golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html (CVE-2024-45338)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift Data Foundation |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1865 is classified as critical due to its potential impact on data integrity and availability.
To fix RHSA-2025:1865, you should update your Red Hat OpenShift Data Foundation to the latest patched version provided by Red Hat.
RHSA-2025:1865 addresses multiple vulnerabilities related to data handling and security in Red Hat OpenShift Data Foundation.
Not addressing RHSA-2025:1865 may lead to unauthorized access, data loss, or disruption of services from your storage environment.
RHSA-2025:1865 affects all users operating the Red Hat OpenShift Data Foundation software.