-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: DevWorkspace Operator Security Update Advisory ID: RHSA-2023:4276-01 Product: DEVWORKSPACE Advisory URL: https://access.redhat.com/errata/RHSA-2023:4276 Issue date: 2023-07-25 CVE Names: CVE-2020-24736 CVE-2023-1667 CVE-2023-2283 CVE-2023-3089 CVE-2023-26604 ===================================================================== 1. Summary: An update is now available for Red Hat DevWorkspace Operator. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: The DevWorkspace Operator extends OpenShift to provide DevWorkspace support. Security Fix(es): * openshift: OCP & FIPS mode (CVE-2023-3089) 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 4. Bugs fixed (https://bugzilla.redhat.com/): 2212085 - CVE-2023-3089 openshift: OCP & FIPS mode 5. JIRA issues fixed (https://issues.redhat.com/): CRW-4562 - DevWorkspace Controller fails when service account creation is disabled 6. References: https://access.redhat.com/security/cve/CVE-2020-24736 https://access.redhat.com/security/cve/CVE-2023-1667 https://access.redhat.com/security/cve/CVE-2023-2283 https://access.redhat.com/security/cve/CVE-2023-3089 https://access.redhat.com/security/cve/CVE-2023-26604 https://access.redhat.com/security/vulnerabilities/RHSB-2023-001 https://access.redhat.com/security/updates/classification/#moderate 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJkwC5LAAoJENzjgjWX9erEcN4P/33M/yoWcZMy5tW4ZEY53CdS Foa48HynWn2SyiJNLsWh1zinJXdCuYWGYJnq9M7Hdczti6iWhDGHxPBpwyCAViLE JyPCCgLJAGah4zUypzw+0PVaCNS4Gy6vmn8vatKsOLJhnrjqu4oDNw1GSWjDXd+G klHwP+5qF/CGUVFr6rR1kM9+W+npBK4PtzyMTxaJOSa6S0DZmK4/CxQ9mA+dIEpI 7ywgEhexmPkyzTpJbHdKmekfrG3W8GuCXjAsYt0HLJJuuQ+MVJqamJXVoOJ+VOQM C6SVu2sO9iTbFKsnm9IBkSM+jg3s3k0o5wKiks8KzEWziAvC48p9meIXTr2tMP9Q acBOwMyWcPihqVwRylCcKWY73ReQbDhPo22bjamyGkrPm/GK6pYx6wIiSOsIGIyO WH2niFRTz7OLJOKj0C3jV8DkEnGRnckZDIqwAmeZZiiNc74hDsdDMhtntuuMakCc 8TjWTKkTDeTI4ECRJQlzTjQtf6DXSPqVId3xocAGDt9nbiROg5bSSvYu+43PDqr1 Q+mlqBU3RSTyaGhj9kJRmSP5uONNws0blWX5Yez0kEYhbYdk6sSzKOpo1vsvECft DUB+WVhxsqshTqw950y9U22iV7Sxi+XyglejCqGoYj8F3nsckVrSD6ZphF8O8TTq yly4pNk4xHjOTNifnlbr =O1Oh -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce