- Issued:
- 2025-01-08
- Updated:
- 2025-01-08
RHSA-2025:0082 - Important: Red Hat OpenShift Data Foundation 4.16.5 Bug Fix Update
Synopsis
Important: Red Hat OpenShift Data Foundation 4.16.5 Bug Fix Update
Type/Severity
Security Advisory Important
Topic
Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.16.5 on Red Hat Enterprise Linux 9 from Red Hat Container Registry.
Description
Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multi-cloud data management service with an S3 compatible API.
Security Fix(es) from Bugzilla:
-
dompurify: DOMPurify vulnerable to tampering by prototype pollution (CVE-2024-48910)
-
tough-cookie: prototype pollution in cookie memstore (CVE-2023-26136)
-
css-tools: Improper Input Validation causes Denial of Service via Regular Expression (CVE-2023-26364)
-
net/http: Denial of service due to improper 100-continue handling in net/http (CVE-2024-24791)
-
path-to-regexp: Backtracking regular expressions cause ReDoS (CVE-2024-45296)
-
express: Improper Input Handling in Express Redirects (CVE-2024-43796)
-
send: Code Execution Vulnerability in Send Library (CVE-2024-43799)
-
serve-static: Improper Sanitization in serve-static (CVE-2024-43800)
-
nanoid: nanoid mishandles non-integer values (CVE-2024-55565)
-
cross-spawn: regular expression denial of service (CVE-2024-21538)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenShift Data Foundation | 4 | x86_64 |
| Red Hat OpenShift Data Foundation for RHEL 9 ARM | 4 | aarch64 |
| Red Hat OpenShift Data Foundation for IBM Z and LinuxONE | 4 | s390x |
| Red Hat OpenShift Data Foundation for IBM Power, little endian | 4 | ppc64le |
Fixes
- This content is not included.BZ - 2219310
- This content is not included.BZ - 2250364
- This content is not included.BZ - 2295310
- This content is not included.BZ - 2310908
- This content is not included.BZ - 2311152
- This content is not included.BZ - 2311153
- This content is not included.BZ - 2311154
- This content is not included.BZ - 2322949
- This content is not included.BZ - 2324550
- This content is not included.BZ - 2331063
CVEs
- CVE-2023-26136
- CVE-2023-26364
- CVE-2024-9287
- CVE-2024-11168
- CVE-2024-21538
- CVE-2024-24791
- CVE-2024-43796
- CVE-2024-43799
- CVE-2024-43800
- CVE-2024-45296
- CVE-2024-48910
- CVE-2024-55565
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.