- Issued:
- 2024-06-13
- Updated:
- 2024-06-13
RHSA-2024:3919 - Important: Migration Toolkit for Runtimes security, bug fix and enhancement update
Synopsis
Important: Migration Toolkit for Runtimes security, bug fix and enhancement update
Type/Severity
Security Advisory Important
Topic
Migration Toolkit for Runtimes 1.2.6 release Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Migration Toolkit for Runtimes 1.2.6 Images
Security Fix(es):
- undertow: Cookie Smuggling/Spoofing (CVE-2023-4639)
- jetty: Improper addition of quotation marks to user inputs in CgiServlet (CVE-2023-36479)
- css-tools: Improper Input Validation causes Denial of Service via Regular Expression (CVE-2023-26364)
- css-tools: regular expression denial of service (ReDoS) when parsing CSS (CVE-2023-48631)
- keycloak: path transversal in redirection validation (CVE-2024-1132)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
Install the latest version of the Migration Toolkit for Runtimes from the Red Hat catalog in the OperatorHub page within your OpenShift instance.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Migration Toolkit for Runtimes | Advisory Metadata | x86_64 |
Fixes
- This content is not included.BZ - 2166022
- This content is not included.BZ - 2239630
- This content is not included.BZ - 2250364
- This content is not included.BZ - 2254559
- This content is not included.BZ - 2262117
CVEs
- CVE-2021-43618
- CVE-2022-4645
- CVE-2022-48622
- CVE-2023-4639
- CVE-2023-6004
- CVE-2023-6597
- CVE-2023-6918
- CVE-2023-7008
- CVE-2023-25193
- CVE-2023-26364
- CVE-2023-36479
- CVE-2023-43785
- CVE-2023-43786
- CVE-2023-43787
- CVE-2023-48631
- CVE-2024-0450
- CVE-2024-1132
- CVE-2024-21011
- CVE-2024-21012
- CVE-2024-21068
- CVE-2024-21085
- CVE-2024-21094
- CVE-2024-22365
- CVE-2024-25062
- CVE-2024-26458
- CVE-2024-26461
- CVE-2024-28834
- CVE-2024-33599
- CVE-2024-33600
- CVE-2024-33601
- CVE-2024-33602
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.