-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift API for Data Protection (OADP) 1.1.3 security and bug fix update Advisory ID: RHSA-2023:1639-01 Product: OpenShift API for Data Protection Advisory URL: https://access.redhat.com/errata/RHSA-2023:1639 Issue date: 2023-04-05 CVE Names: CVE-2022-41724 CVE-2022-41725 CVE-2023-23916 ===================================================================== 1. Summary: OpenShift API for Data Protection (OADP) 1.1.3 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: OpenShift API for Data Protection (OADP) enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes. Security Fix(es): * golang: crypto/tls: large handshake records may cause panics (CVE-2022-41724) * golang: net/http, mime/multipart: denial of service from excessive resource consumption (CVE-2022-41725) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2178488 - CVE-2022-41725 golang: net/http, mime/multipart: denial of service from excessive resource consumption 2178492 - CVE-2022-41724 golang: crypto/tls: large handshake records may cause panics 5. References: https://access.redhat.com/security/cve/CVE-2022-41724 https://access.redhat.com/security/cve/CVE-2022-41725 https://access.redhat.com/security/cve/CVE-2023-23916 https://access.redhat.com/security/updates/classification/#moderate 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZC08PdzjgjWX9erEAQhicQ/+IXpHurSFokjaaa1BxijL3DsThUTLVbts 4LvasCOx9o0bjJ8l08mLPocVojz7VEbxJ9/bsk+GnfxwWaO4fwj5rqbdvCJvWu6P tV3thNPABCgAfq4HLd4dT/O/tap0XuFCzhXLRs5fo4amuMlcsrfvSKd8aplQVjXb 7P7gP/IlxaLWpZqvganRdMaiAqm+X7eukxs2rEz0urSHFKLkBE8Wg4BHCRk5Kp+V uBC4KcRrzQQxsAQJk7ACBM6Mk/ankKbsEKzdkeIlLTymNNz1OzCnjDpqgSkrnFNm n18nkUuv5LHVjLERWJHtIS8XUoNpWX1139l3cAVAonkTJTHQP4Pu8cSJ0YIVcNTM muxyZoI1GucrV4adoYPEnLeU2F0yCV1udkz4E3aYOfnMz4YxIMwb2c8K49ukdGbj t/JI07x3vUITb+bwu353gvnaJFsuu07O9uDUwGy01Rs2v9huY/a2KJGguRIOV0b6 9gNqe/S/hHhzGHSBdip2iiewMdA0uJ7tsU6syA5adjRD2vPo9DvzttiNNMpUdYyu 58YFZvAWRxos0dycLecDX51s5KDzC599Y55SDjMsO6PI/9DVUTUU7kQY91MuOdAh nkpWyFFILYCDdEpDTpvDvXkMLvDd49aU/ypACEEvmnxIC2GIvOwMjiFzHw6OdwxS 1F3uzGkRFO8= =wnE7 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce