-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat OpenShift Data Science 1.22.1 security update Advisory ID: RHSA-2023:0977-01 Product: RHODS Advisory URL: https://access.redhat.com/errata/RHSA-2023:0977 Issue date: 2023-02-28 CVE Names: CVE-2022-4415 CVE-2022-23521 CVE-2022-40303 CVE-2022-40304 CVE-2022-41903 CVE-2022-47629 CVE-2023-0923 ===================================================================== 1. Summary: An update for kubeflow, dashboard, deployer is now available for Red Hat OpenShift Data Science 1.22. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Data Science 1.22.1 (kubeflow, dashboard, deployer) security update Security Fix(es): * odh-notebook-controller-container: Missing authorization allows for file contents disclosure (CVE-2023-0923) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2171870 - CVE-2023-0923 odh-notebook-controller-container: Missing authorization allows for file contents disclosure 5. JIRA issues fixed (https://issues.jboss.org/): RHODS-6123 - Update dsp repo to match upstream kfp-tekton repo RHODS-6136 - Verify status of manifests RHODS-6330 - Remove Openvino and Etcd images from quay for self-managed deployments RHODS-6779 - [Model Serving] fallback image for ovms is not published, leading to image pull errors in upgrade scenarios 6. References: https://access.redhat.com/security/cve/CVE-2022-4415 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-40303 https://access.redhat.com/security/cve/CVE-2022-40304 https://access.redhat.com/security/cve/CVE-2022-41903 https://access.redhat.com/security/cve/CVE-2022-47629 https://access.redhat.com/security/cve/CVE-2023-0923 https://access.redhat.com/security/updates/classification/#important 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY/3zstzjgjWX9erEAQjCMQ/8Ce6TeflSnK0MOAMQlzjGPk7KarX0KSM3 n21ANpVAhbwkN/85y3SEyLdC+0Yx7nP3N9Qtogjb7f86JMjilTN/L+wDkgju5V8J HZmGxS/pVF67eonoj3xJQ9SaeLUfsaiLXI0q5xwr3ZgnKTVAXN3S10Wr6zeC6Y+R +xZ5z5I1ffK1Ufkls3X7mwta87CAMzbDunmq37jNubVeid8iRrETsQAc9+h5cZ08 o1j55joyE/B4lBKbP58xVWA4vM2znP9lCntBvAa0oOE+l8vGzkOuJhlS6xGtOyO8 W/60Sd57pNK9QZ+T1n+PRCsOcxZHcmECYC+SQpOJjduCZeS2stjigqm8s91WIg8S gKLBBMo5nCU0UjgtS1fZqxbqvpFDUp8TvLaPGclmoV3vZTycYi0mL7LqRghXXPJ0 1sNi/GXAnUrKwNzX9WALaYk7CWT28E223xjLQwqMyT5HGfypB7eFDVjNOnQR8AI6 +GVafTiBIHYcTfY/2heFQtzYJmzF0OLQvv1H+zaeevcTxdfIPtxlKZmQwefDlXHW m6pOMsRUg0iX+8VzN4kPQUUaDo9H3X98nG2yvws8unAKs8v/VlfNJr1kLztwEzto 9k0x/k5d9IZzuX/iBX7cGcAxD6scFc/IMlZ87GIvBZIZNkCXqaBaY1uAWeBiekqc NyJ+NGzOeX0= =VmLa -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce