- Issued:
- 2022-09-06
- Updated:
- 2022-09-06
RHSA-2022:6348 - Security Advisory
Synopsis
Moderate: Gatekeeper Operator v0.2 security and container updates
Type/Severity
Security Advisory: Moderate
Topic
Gatekeeper Operator v0.2 security updates
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Description
Gatekeeper Operator v0.2
Gatekeeper is an open source project that applies the OPA Constraint
Framework to enforce policies on your Kubernetes clusters.
This advisory contains the container images for Gatekeeper that include bug
fixes and container upgrades.
Note: Gatekeeper support from the Red Hat support team is limited to where it is integrated and used with Red Hat Advanced Cluster Management
for Kubernetes. For support options for any other use, see the Gatekeeper
open source project website at:
https://open-policy-agent.github.io/gatekeeper/website/docs/howto/.
Security fix:
- CVE-2022-30629: gatekeeper-container: golang: crypto/tls: session tickets lack random ticket_age_add
- CVE-2022-1705: golang: net/http: improper sanitization of Transfer-Encoding header
- CVE-2022-1962: golang: go/parser: stack exhaustion in all Parse* functions
- CVE-2022-28131: golang: encoding/xml: stack exhaustion in Decoder.Skip
- CVE-2022-30630: golang: io/fs: stack exhaustion in Glob
- CVE-2022-30631: golang: compress/gzip: stack exhaustion in Reader.Read
- CVE-2022-30632: golang: path/filepath: stack exhaustion in Glob
- CVE-2022-30635: golang: encoding/gob: stack exhaustion in Decoder.Decode
- CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal
- CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
Solution
The requirements to apply the upgraded images are different whether or not you
used the operator. Complete the following steps, depending on your installation:
- Upgrade gatekeeper operator:
The gatekeeper operator that is installed by the gatekeeper operator policy has
`installPlanApproval` set to `Automatic`. This setting means the operator will
be upgraded automatically when there is a new version of the operator. No
further action is required for upgrade. If you changed the setting for `installPlanApproval` to `manual`, then you must view each cluster to manually
approve the upgrade to the operator.
- Upgrade gatekeeper without the operator:
The gatekeeper version is specified as part of the Gatekeeper CR in the
gatekeeper operator policy. To upgrade the gatekeeper version:
a) Determine the latest version of gatekeeper by visiting:
https://catalog.redhat.com/software/containers/rhacm2/gatekeeper-rhel8/5fadb4a18d9a79d2f438a5d9. b) Click the tag dropdown, and find the latest static tag. An example tag is
'v3.3.0-1'.
c) Edit the gatekeeper operator policy and update the image tag to use the
latest static tag. For example, you might change this line to image: 'registry.redhat.io/rhacm2/gatekeeper-rhel8:v3.3.0-1'.
Refer to https://open-policy-agent.github.io/gatekeeper/website/docs/howto/ for additional information.
Affected Products
- Red Hat Advanced Cluster Management for Kubernetes 2 for RHEL 8 x86_64
Fixes
- BZ - 2092793 - CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add
- BZ - 2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read
- BZ - 2107371 - CVE-2022-30630 golang: io/fs: stack exhaustion in Glob
- BZ - 2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header
- BZ - 2107376 - CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions
- BZ - 2107383 - CVE-2022-32148 golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working
- BZ - 2107386 - CVE-2022-30632 golang: path/filepath: stack exhaustion in Glob
- BZ - 2107388 - CVE-2022-30635 golang: encoding/gob: stack exhaustion in Decoder.Decode
- BZ - 2107390 - CVE-2022-28131 golang: encoding/xml: stack exhaustion in Decoder.Skip
- BZ - 2107392 - CVE-2022-30633 golang: encoding/xml: stack exhaustion in Unmarshal
CVEs
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.