Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:0853 - Security Advisory
Issued:
2024-02-21
Updated:
2024-02-21

RHSA-2024:0853 - Security Advisory

  • Overview
  • Updated Images

Synopsis

Moderate: Network Observability 1.5.0 for OpenShift

Type/Severity

Security Advisory: Moderate

Topic

Network Observability is an OpenShift operator that deploys a monitoring pipeline to collect and enrich network flows that are produced by the Network Observability eBPF agent.

The operator provides dashboards, metrics, and keeps flows accessible in a queryable log store, Grafana Loki. When a FlowCollector is deployed, new dashboards are available in the Console.

Description

Network Observability 1.5.0

Security Fix(es):

  • CVE-2023-26159 follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Network Observability (NETOBSERV) 1 for RHEL 9 x86_64
  • Network Observability (NETOBSERV) for ARM 64 1 for RHEL 9 aarch64
  • Network Observability (NETOBSERV) for IBM Power, little endian 1 for RHEL 9 ppc64le
  • Network Observability (NETOBSERV) for IBM Z and LinuxONE 1 for RHEL 9 s390x

Fixes

  • BZ - 2256413 - CVE-2023-26159 follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()
  • NETOBSERV-1134 - Console plugin enable notch does not work when register is false
  • NETOBSERV-1305 - Fix bundle build warnings (features.operators.openshift.io)
  • NETOBSERV-1351 - No graph for Flows Overhead
  • NETOBSERV-1430 - Some flows are not seen as metrics (both prom and loki)
  • NETOBSERV-1443 - Console plugin loki timeout should be configurable
  • NETOBSERV-1464 - "Input size too long" error is not well understood
  • NETOBSERV-1293 - flowcollector status oscillates between DeploymentInProgress and Ready
  • NETOBSERV-1316 - Top X average DNS latencies panel has NaN values
  • NETOBSERV-1380 - Empty/NaN graphs - invalid metric type selection
  • NETOBSERV-1225 - Enablement of perflow RTT latency analysis
  • NETOBSERV-1286 - Metrics and dashboard enhancements for Lokiless usage
  • NETOBSERV-1311 - DNS tracking improvments
  • NETOBSERV-1335 - Capture and expose DSCP field from IP header
  • NETOBSERV-1341 - Expose metrics definitions via the CRD [dev preview]
  • NETOBSERV-245 - Store cluster id and other metadata, enhance UI
  • NETOBSERV-657 - NetFlow Table Enhancements 1.5
  • NETOBSERV-676 - NetFlow Overview Enhancements 1.5
  • NETOBSERV-763 - Easier configuration
  • NETOBSERV-1313 - DNS tracking related panels are not loaded on default when feature is enabled

CVEs

  • CVE-2021-35937
  • CVE-2021-35938
  • CVE-2021-35939
  • CVE-2021-43618
  • CVE-2023-7104
  • CVE-2023-26159
  • CVE-2023-29491
  • CVE-2023-29499
  • CVE-2023-32611
  • CVE-2023-32665
  • CVE-2023-36054
  • CVE-2023-38545
  • CVE-2023-38546
  • CVE-2023-39615
  • CVE-2023-39975
  • CVE-2023-44487

References

  • https://access.redhat.com/security/updates/classification/#moderate

aarch64

network-observability/network-observability-console-plugin-rhel9@sha256:200a01e89cfaab556fb22a4a01cc25df0746998c3d2cce6a6fc9d43cecb23490
network-observability/network-observability-ebpf-agent-rhel9@sha256:d22a932d5cfbe8e79542ad4d718f09724bd6a37ced80ac29b7d9c8c9dc2148cd
network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:0e8486070198313ee1ec61bb515a2c2479ccefcd497d1e3d8deee66e05642db7
network-observability/network-observability-operator-bundle@sha256:fc26b4d8bcba231af681b5b148572d31b91d1498621479926ee5f8ea5056702e
network-observability/network-observability-rhel9-operator@sha256:3f5bc47665e0ee6eb3a9d1f500e4592fb79c8fc42bcd11685f15f046906512fb

ppc64le

network-observability/network-observability-console-plugin-rhel9@sha256:0335cfa3eef8bd0a23af93c1dd0db1eb587b1e32ef3f6c634b6582655a73d47a
network-observability/network-observability-ebpf-agent-rhel9@sha256:f456e8892837b334436ce9417364fbca1c00395e54fa9b8a82b97e0bd1a311ba
network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:514cfc58f43b4e9a544d8c49ba595f17e423fca99b0cdad7022983cdbba206e2
network-observability/network-observability-operator-bundle@sha256:54265e4e7303a2360e93b08a562a6adb9ea56440ad5f44c9b17344215520a16a
network-observability/network-observability-rhel9-operator@sha256:d5ae40575fff6b91173d2ca9c05015e2a9a0134532d3ddeb78ba8a33eaf30515

s390x

network-observability/network-observability-console-plugin-rhel9@sha256:089af8c30c1e0f417859fbd1ea2e2c789b1b2cc63e83ff36b7e8080197ea3f27
network-observability/network-observability-ebpf-agent-rhel9@sha256:44b139d80784617055688a85a1257a6b29dd337281be23ad70bb431bd4bddd37
network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:bfef12fb923f1d49daa1d0209834f89ae42455deb7576ccd7257deb6bb083f5f
network-observability/network-observability-operator-bundle@sha256:e9e9c7032c1cb1c613fc7bde020b2f281d9509441f093754c55127cc54112d57
network-observability/network-observability-rhel9-operator@sha256:61728634fb37058c60c0942103eaf64aded578d9d5fe3c2bac2d55d569b5a553

x86_64

network-observability/network-observability-console-plugin-rhel9@sha256:78d96d58fd232fee462a60a8fb71293e7cdbe93cb4437459497e87ff24f55ec3
network-observability/network-observability-ebpf-agent-rhel9@sha256:9eb9f3de0debd6c29c44512b447d917a4439f552ac913763565d5011a5ea4bfb
network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:ceea44928d9c0a31ee2ace2b66c470666a3be9795921f3ca18e2c101025dab57
network-observability/network-observability-operator-bundle@sha256:c97aff3b0ed506b2a1e34c1b22878dc42c6ef3ebf03b73147e8879e23ab5f8af
network-observability/network-observability-rhel9-operator@sha256:59e8c9627d5cd581a4d1a77d875a9754709bbb05a530b5893ee70460a9b8c7a2

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility