- Issued:
- 2023-11-15
- Updated:
- 2023-11-15
RHSA-2023:6269 - Security Advisory
Synopsis
Important: cert-manager Operator for Red Hat OpenShift 1.12.1
Type/Severity
Security Advisory: Important
Topic
cert-manager Operator for Red Hat OpenShift 1.12.1
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The cert-manager Operator for Red Hat OpenShift builds on top of Kubernetes, introducing certificate authorities and certificates as first-class resource types in the Kubernetes API. This makes it possible to provide certificates-as-a-service to developers working within your Kubernetes cluster.
Security Fix(es):
- golang: net/http, x/net/http2: rapid stream resets can cause excessive work (Rapid Reset Attack) (CVE-2023-39325)
- HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)
A Red Hat Security Bulletin which addresses further details about the Rapid Reset flaw is available in the References section.
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
The steps to apply the upgraded images are different depending on the installation plan approval policy you used when installing the cert-manager Operator for Red Hat OpenShift.
- If the approval policy is set to , then the Operator will be upgraded automatically when there is a new version of the Operator. No further action is required to upgrade. This is the default setting.
- If you changed the approval policy to , then you must manually approve the upgrade to the Operator.
See https://github.com/openshift/cert-manager-operator/blob/master/README.md for additional information.
Affected Products
- Cert Manager support for Red Hat OpenShift release 1.12 x86_64
Fixes
- BZ - 2242803 - CVE-2023-44487 HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
- BZ - 2243296 - CVE-2023-39325 golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)
- CM-213 - [cert-manager-1.12] Cert-manager-operator pod has incorrect nodeaffinitiy config
- CM-224 - [z-stream release] Bump operator to cert-manager 1.12.1
CVEs
x86_64
cert-manager/cert-manager-operator-bundle@sha256:140dafad28aa23ffccfcd87ff0674aa9fcbd904194728a9ee482bfa2d8d976aa |
cert-manager/cert-manager-operator-rhel9@sha256:7d3029dbcbcbec5f6b257afc8866c0b87bc2c694dc7f3fa7ad9e88e2b61cb3d0 |
cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:4db42d2b0403b2ae116c52cfa95bc54d621200072ad2c584a38a8e0e9b6e0a71 |
cert-manager/jetstack-cert-manager-rhel9@sha256:1e3f9343999d6ed86d052688623de31fa74eee6f0b1a747dac32b661ec714b00 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.