- Issued:
- 2024-06-17
- Updated:
- 2024-06-17
RHSA-2024:3868 - Important: Network Observability 1.6.0 for OpenShift
Synopsis
Important: Network Observability 1.6.0 for OpenShift
Type/Severity
Security Advisory Important
Topic
Network Observability 1.6 for Red Hat OpenShift
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Network Observability 1.6.0
Security Fix(es):
- CVE-2024-29180 webpack-dev-middleware: lack of URL validation may lead to file leak
- CVE-2024-24786 golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
- CVE-2023-42282 nodejs-ip: arbitrary code execution via the isPublic() function
- CVE-2023-39326 golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests
- CVE-2024-28849 follow-redirects: Possible credential leak
- CVE-2024-24783 golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
- CVE-2023-45289 golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect
- CVE-2023-45290 golang: net/http: memory exhaustion in Request.ParseMultipartForm
- CVE-2024-24785 golang: html/template: errors returned from MarshalJSON methods may break template escaping
- CVE-2024-29041 express: cause malformed URLs to be evaluated [noo-1]
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Network Observability (NETOBSERV) | 1 | x86_64 |
| Network Observability (NETOBSERV) for IBM Z and LinuxONE | 1 | s390x |
| Network Observability (NETOBSERV) for IBM Power, little endian | 1 | ppc64le |
| Network Observability (NETOBSERV) for ARM 64 | 1 | aarch64 |
Fixes
- This content is not included.BZ - 2253330
- This content is not included.BZ - 2265161
- This content is not included.BZ - 2268017
- This content is not included.BZ - 2268018
- This content is not included.BZ - 2268019
- This content is not included.BZ - 2268022
- This content is not included.BZ - 2268046
- This content is not included.BZ - 2269576
- This content is not included.BZ - 2270863
- This content is not included.BZ - 2290901
- This content is not included.NETOBSERV-1544
- This content is not included.NETOBSERV-1607
- This content is not included.NETOBSERV-1647
- This content is not included.NETOBSERV-1279
- This content is not included.NETOBSERV-1408
- This content is not included.NETOBSERV-1424
- This content is not included.NETOBSERV-1453
- This content is not included.NETOBSERV-1459
- This content is not included.NETOBSERV-1462
- This content is not included.NETOBSERV-1598
- This content is not included.NETOBSERV-1606
- This content is not included.NETOBSERV-1630
- This content is not included.NETOBSERV-1621
CVEs
- CVE-2022-48554
- CVE-2023-2975
- CVE-2023-3446
- CVE-2023-3817
- CVE-2023-5678
- CVE-2023-6129
- CVE-2023-6237
- CVE-2023-7008
- CVE-2023-39326
- CVE-2023-42282
- CVE-2023-45289
- CVE-2023-45290
- CVE-2024-0727
- CVE-2024-2961
- CVE-2024-24783
- CVE-2024-24785
- CVE-2024-24786
- CVE-2024-25062
- CVE-2024-28182
- CVE-2024-28834
- CVE-2024-28835
- CVE-2024-28849
- CVE-2024-29041
- CVE-2024-29180
- CVE-2024-33599
- CVE-2024-33600
- CVE-2024-33601
- CVE-2024-33602
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.