-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: Red Hat OpenShift GitOps security update
Advisory ID:       RHSA-2022:5153-01
Product:           Red Hat OpenShift GitOps
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:5153
Issue date:        2022-06-22
Updated on:        2022-06-24
CVE Names:         CVE-2022-1271 CVE-2022-31016 CVE-2022-31034 
                   CVE-2022-31035 CVE-2022-31036 
====================================================================
1. Summary:

An update is now available for Red Hat OpenShift GitOps 1.4.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat Openshift GitOps is a declarative way to implement continuous
deployment for cloud native applications.

Security Fix(es):

* argocd: vulnerable to a variety of attacks when an SSO login is initiated
from the Argo CD CLI or the UI. (CVE-2022-31034)

* argocd: cross-site scripting (XSS) allow a malicious user to inject a
javascript link in the UI (CVE-2022-31035)

* argocd: vulnerable to an uncontrolled memory consumption bug
(CVE-2022-31016)

* argocd: vulnerable to a symlink following bug allowing a malicious user
with repository write access (CVE-2022-31036)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2096278 - CVE-2022-31035 argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI
2096282 - CVE-2022-31034 argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI.
2096283 - CVE-2022-31016 argocd: vulnerable to an uncontrolled memory consumption bug
2096291 - CVE-2022-31036 argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access

5. References:

https://access.redhat.com/security/cve/CVE-2022-1271
https://access.redhat.com/security/cve/CVE-2022-31016
https://access.redhat.com/security/cve/CVE-2022-31034
https://access.redhat.com/security/cve/CVE-2022-31035
https://access.redhat.com/security/cve/CVE-2022-31036
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYrn4XtzjgjWX9erEAQirDg//U2A5kMqqeRJL3OdGwKONtlLyN+bvVEnG
RC93OzIhHnANwtztsosNuxkqMyglmcstB8OL3fKmyBMkSNQ00ZwcSFUscCQL68qs
0Lfy+i+CLzHf2UM+lmVZtlmjCepZwUtWg9TgRp5CY1ctBvIdY9EcnJl337Ntd/qV
pk5WaTTZYxCqe03QYuD6EkJ2+9Q8oe4ijXBXsIKZb1f4JtPoTXtFQgoSQpUv4Uux
B8tMU6ddQ5zIY6l1V/gXF3wV9pD3y0ilvp2YmToF+G+E3N3bDT7whllcb/b6btni
GE8DTh2Z4wyg4/2BPGG444n4fX7x0PjX6J8Ttcq7Uy1kP0DbFY6fS5SWTjbc/lKW
aol6v3N1EmRKoGXetx9AymowUrGpaSeGvElN6gXQ0u4QrgivcDKzErlDnsz0hu/s
hOqXb4lgrq/XSd/69SwQcUUmnbDWt8UN4MmkE94DVPfXkbIC+uRhv6VDFtYTarP5
zu7zKHrGAsoYoi8aa1c1Lq3HxlSEc4l44KWJp/z1KWqxc0eebu8XHAoelJv35rX+
gyX4/T2dsFLymwsxsseTf8LAm8u1CgUHsKA0XfSC7MrwnvXyTVJSkgj/MtTnSmv/
N3HaqN9vj3Z5Py7EzmC4UGYnidaODfwmcODhwqEGXW4uxHNz4AyBU9KBZqf3w+8D
TK1Fg89Smqg=y2G6
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-5153:01 Important: Red Hat OpenShift GitOps security

An update is now available for Red Hat OpenShift GitOps 1.4

Summary

Red Hat Openshift GitOps is a declarative way to implement continuous deployment for cloud native applications.
Security Fix(es):
* argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. (CVE-2022-31034)
* argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI (CVE-2022-31035)
* argocd: vulnerable to an uncontrolled memory consumption bug (CVE-2022-31016)
* argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access (CVE-2022-31036)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2022-1271 https://access.redhat.com/security/cve/CVE-2022-31016 https://access.redhat.com/security/cve/CVE-2022-31034 https://access.redhat.com/security/cve/CVE-2022-31035 https://access.redhat.com/security/cve/CVE-2022-31036 https://access.redhat.com/security/updates/classification/#important

Package List


Severity
Advisory ID: RHSA-2022:5153-01
Product: Red Hat OpenShift GitOps
Advisory URL: https://access.redhat.com/errata/RHSA-2022:5153
Issued Date: : 2022-06-22
Updated on: 2022-06-24
CVE Names: CVE-2022-1271 CVE-2022-31016 CVE-2022-31034 CVE-2022-31035 CVE-2022-31036

Topic

An update is now available for Red Hat OpenShift GitOps 1.4.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2096278 - CVE-2022-31035 argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI

2096282 - CVE-2022-31034 argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI.

2096283 - CVE-2022-31016 argocd: vulnerable to an uncontrolled memory consumption bug

2096291 - CVE-2022-31036 argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access


Related News