- Issued:
- 2023-08-03
- Updated:
- 2023-08-03
RHSA-2023:4475 - Security Advisory
Synopsis
Moderate: Gatekeeper Operator v0.2 security fixes and enhancements
Type/Severity
Security Advisory: Moderate
Topic
Gatekeeper Operator v0.2 security fixes and enhancements
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.
Description
Gatekeeper Operator v0.2
Gatekeeper is an open source project that applies the OPA Constraint
Framework to enforce policies on your Kubernetes clusters.
This advisory contains the container images for Gatekeeper that include bug
fixes and container upgrades.
Note: Gatekeeper support from the Red Hat support team is limited cases
where it is integrated and used with Red Hat Advanced Cluster Management
for Kubernetes. For support options for any other use, see the Gatekeeper
open source project website at:
https://open-policy-agent.github.io/gatekeeper/website/docs/howto/.
Security fix(es):
- CVE-2023-3089 openshift: OCP & FIPS mode
Solution
IMPORTANT: This release removes `PodSecurityPolicy` resource references, a deprecated Kubernetes construct, from the operator. Gatekeeper constraints based on the resource may no longer work.
The Gatekeeper operator that is installed by the Gatekeeper operator policy has `installPlanApproval` set to `Automatic`. This setting means the operator is upgraded automatically when there is a new version of the operator. No further action is required for upgrade. If you changed the setting to `Manual`, then you must view each cluster to manually approve the upgrade to the operator.
Affected Products
- Red Hat Advanced Cluster Management for Kubernetes 2 for RHEL 8 x86_64
Fixes
- BZ - 2212085 - CVE-2023-3089 openshift: OCP & FIPS mode
CVEs
aarch64
rhacm2/gatekeeper-rhel8@sha256:737bc8565c56f4dfd94e3ad7d2ddc4cb2d71e494699a673f903cfea4a389528d |
rhacm2/gatekeeper-rhel8-operator@sha256:63397861bf67643df917bd99ba2b6d1192bc2c13e444c8b9814888eb0393e980 |
ppc64le
rhacm2/gatekeeper-rhel8@sha256:d0975c47b69c70050d2eff58b84ddfa4a2c74b372692cce1a670d4f555aa8d8f |
rhacm2/gatekeeper-rhel8-operator@sha256:ab921962af6f313007001800086880d3e1024222de8e80f211efa9c6146b26ba |
s390x
rhacm2/gatekeeper-rhel8@sha256:348da9517d31797a13690770091907b5b35ec08f856d26d06b1f831d394fe3a2 |
rhacm2/gatekeeper-rhel8-operator@sha256:d51f62873e02235d5129234125dbcacd47033ee80178e4eaed80562b48721838 |
x86_64
rhacm2/gatekeeper-operator-bundle@sha256:6935ac39d7885d9fac1e99f97c2a3e72f2297fef465c4420729d985605e55dc5 |
rhacm2/gatekeeper-rhel8@sha256:2a15cbed56e92ccdb7920765b80cf6bfc0d08e0db61265eba56d67bc12a4f616 |
rhacm2/gatekeeper-rhel8-operator@sha256:0e16bd30d58de5a17a9669c819f51040acdbb3bd556d5b749915a31f10859c04 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.