- Issued:
- 2022-08-25
- Updated:
- 2022-08-25
RHSA-2022:6187 - Security Advisory
Synopsis
Important: Node Health Check Operator 0.3.1 security update
Type/Severity
Security Advisory: Important
Topic
An update for node-healthcheck-operator-bundle-container and node-healthcheck-operator-container is now available for Node Healthcheck Operator 0.3 for RHEL 8. This Operator is delivered by Red Hat Workload Availability.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
This is an updated release of the Node Health Check Operator. You can use the Node Health Check Operator to deploy the Node Health Check controller. The controller identifies unhealthy nodes and uses the Self Node Remediation Operator to remediate the unhealthy nodes.
Security Fix(es):
- golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)
- golang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)
- golang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, see the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, see:
Affected Products
- Red Hat OpenShift Workload Availability 1 for RHEL 8 x86_64
Fixes
- BZ - 2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar
- BZ - 2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read
- BZ - 2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.