First published: Thu May 15 2025(Updated: )
Errata Advisory for Red Hat OpenShift GitOps 1.15.2 release<br>Security Fix(es):<br><li> openshift-gitops-operator-container: Namespace Isolation Break [gitops-1.15](CVE-2024-13484) </li> <li> openshift-gitops-argocd-container: Go JOSE's Parsing Vulnerable to Denial of Service [gitops-1.15](CVE-2025-27144) </li> <li> openshift-gitops-argocd-rhel9-container: Go JOSE's Parsing Vulnerable to Denial of Service [gitops-1.15](CVE-2025-27144) </li> <li> openshift-gitops-dex-container: Go JOSE's Parsing Vulnerable to Denial of Service [gitops-1.15](CVE-2025-27144) </li> <li> openshift-gitops-operator-bundle-container: Go JOSE's Parsing Vulnerable to Denial of Service [gitops-1.15](CVE-2025-27144) </li> <li> openshift-gitops-container: Potential denial of service in golang.org/x/crypto [gitops-1.15](CVE-2025-22869) </li> <li> openshift-gitops-argo-rollouts-container: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS [gitops-1.15](CVE-2023-45288) </li> <li> openshift-gitops-argocd-container: Memory Exhaustion in Expr Parser with Unrestricted Input [gitops-1.15](CVE-2025-29786) </li> <li> openshift-gitops-argocd-rhel9-container: Memory Exhaustion in Expr Parser with Unrestricted Input [gitops-1.15](CVE-2025-29786) </li> <li> openshift-gitops-argocd-container: jwt-go allows excessive memory allocation during header parsing [gitops-1.15](CVE-2025-30204) </li> <li> openshift-gitops-argocd-rhel9-container: jwt-go allows excessive memory allocation during header parsing [gitops-1.15](CVE-2025-30204) </li> <li> openshift-gitops-operator-bundle-container: jwt-go allows excessive memory allocation during header parsing [gitops-1.15](CVE-2025-30204) </li> <li> openshift-gitops-argocd-container: Prototype Pollution in redoc [gitops-1.15](CVE-2024-57083) </li> <li> openshift-gitops-argocd-rhel9-container: Prototype Pollution in redoc [gitops-1.15](CVE-2024-57083) </li> <li> openshift-gitops-dex-container: Unexpected memory consumption during token parsing in golang.org/x/oauth2 [gitops-1.15](CVE-2025-22868)</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE page(s)<br>listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift | ||
Red Hat OpenShift GitOps | ||
Red Hat OpenShift GitOps | ||
Red Hat OpenShift GitOps |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:7753 is high due to significant vulnerabilities affecting namespace isolation and potential denial of service.
To fix RHSA-2025:7753, update to the patched versions of Red Hat OpenShift GitOps as mentioned in the advisory.
RHSA-2025:7753 addresses vulnerabilities in the openshift-gitops-operator-container and openshift-gitops-argocd-container related to namespace isolation and denial of service.
Products affected by RHSA-2025:7753 include Red Hat OpenShift GitOps and its variants for IBM Z, LinuxONE, ARM 64, and IBM Power.
Currently, there are no official workarounds for RHSA-2025:7753; the recommended action is to apply the updates.