- Issued:
- 2024-10-22
- Updated:
- 2024-10-22
RHSA-2024:8014 - Security Advisory
Synopsis
Important: Network Observability 1.7.0 for OpenShift
Type/Severity
Security Advisory: Important
Topic
Network Observability 1.7 for Red Hat OpenShift
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
Description
Network Observability 1.7.0
Security Fix(es):
- Network Observability: Code Execution Vulnerability in Send Library (CVE-2024-43799)
- Network Observability: XSS vulnerability via prototype pollution (CVE-2024-45801)
- Network Observability: axios: Server-Side Request Forgery (CVE-2024-39338)
- Network Observability: Denial of Service Vulnerability in body-parser (CVE-2024-45590)
- Network Observability: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule (CVE-2024-43788)
- Network Observability: Backtracking regular expressions cause ReDoS (CVE-2024-45296)
- Network Observability: Improper Input Handling in Express Redirects (CVE-2024-43796)
- Network Observability: Improper Sanitization in serve-static (CVE-2024-43800)
- Network Observability: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion (CVE-2024-34156)
- Network Observability: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion (CVE-2024-34155)
- Network Observability: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion (CVE-2024-34158)
Solution
For details on how to apply this update, refer to:
Affected Products
- Network Observability (NETOBSERV) 1 for RHEL 9 x86_64
- Network Observability (NETOBSERV) for ARM 64 1 for RHEL 9 aarch64
- Network Observability (NETOBSERV) for IBM Power, little endian 1 for RHEL 9 ppc64le
- Network Observability (NETOBSERV) for IBM Z and LinuxONE 1 for RHEL 9 s390x
Fixes
- BZ - 2308193 - CVE-2024-43788 webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule
- BZ - 2310527 - CVE-2024-34155 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion
- BZ - 2310528 - CVE-2024-34156 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
- BZ - 2310529 - CVE-2024-34158 go/build/constraint: golang: Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion
- BZ - 2310908 - CVE-2024-45296 path-to-regexp: Backtracking regular expressions cause ReDoS
- BZ - 2311152 - CVE-2024-43796 express: Improper Input Handling in Express Redirects
- BZ - 2311153 - CVE-2024-43799 send: Code Execution Vulnerability in Send Library
- BZ - 2311154 - CVE-2024-43800 serve-static: Improper Sanitization in serve-static
- BZ - 2311171 - CVE-2024-45590 body-parser: Denial of Service Vulnerability in body-parser
- BZ - 2312631 - CVE-2024-45801 dompurify: XSS vulnerability via prototype pollution
- NETOBSERV-1884 - DNS Changes for TRT Team
- NETOBSERV-1509 - OpenTelemetry logs exporter in netobserv
- NETOBSERV-163 - Network Observability for Developer
- NETOBSERV-1666 - FIPS compliance & disconnected support
- NETOBSERV-1667 - Supporting non-SRIOV secondary interfaces (for Virtualization case)
- NETOBSERV-1753 - TCP flags filtering capabilities
- NETOBSERV-1377 - Deploy network policy
- NETOBSERV-1538 - Get "Unable to get overview" momentarily after installing NetObserv
- NETOBSERV-1540 - "Manage panels" dialog doesn't filter properly
- NETOBSERV-1564 - [Agent perfs] The accounter shouldn't generate many more flows
- NETOBSERV-1746 - Adapt health dashboard to flows metrics enabled
- NETOBSERV-1748 - Updating a FlowMetric may generate errors in FLP
- NETOBSERV-1766 - Increase loki.WriteBatchSize to 10MB default
- NETOBSERV-1779 - Port configured but not protocol results in no error in eBPF flow filtering
- NETOBSERV-1783 - Improve browser cache validation / cleanup
- NETOBSERV-1788 - Topology doesn't show services
- NETOBSERV-1798 - Multitenant console with Loki: cannot set namespace filters
- NETOBSERV-1805 - netobserv 1.6.1 is creating vast number of threads on OCP 4.14 with errors mentioning tcx binary is not available.
- NETOBSERV-1806 - ICMP type are showing as n/a for icmp traffic
- NETOBSERV-1808 - When using realtime kernel version the agent pods gets stuck in Crashloopbackoff state
- NETOBSERV-1812 - Disable filter becomes enabled when going back to Network Traffic panel
- NETOBSERV-1813 - Text overlaps in Topology slider
- NETOBSERV-1816 - It is not possible to filter on "n/a" latency
- NETOBSERV-1819 - Black popup when hovering over "One way"
- NETOBSERV-1848 - Enable egress metric to show more traffic
- NETOBSERV-1733 - Clear filter, but filter comes back in Network Traffic panel
- NETOBSERV-1811 - Labels are removed in netobserv namespace
CVEs
aarch64
network-observability/network-observability-cli-rhel9@sha256:c469d89f77d04b257c6bf9814a3782540139e35c83ac73c2e5820c20ec2146fd |
network-observability/network-observability-console-plugin-rhel9@sha256:ccf31db5ef85f57422a16a61a5c6aea883396699e1cc8c0f6043d2fc7eb0b8e9 |
network-observability/network-observability-ebpf-agent-rhel9@sha256:8016c95a9891094692764956dc9df211e8a0f8cdcf14e6682565d4c35325e0bf |
network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:54a8042443e480f3543527d6121dbbaab57394554282b8f4fc885a1ba2b28844 |
network-observability/network-observability-operator-bundle@sha256:268ac72b4a0bf05893cca0924a80ebd2107f3e859329406257da6ce59ec08dfe |
network-observability/network-observability-rhel9-operator@sha256:8c5836a79d4f6562ed17db8488422db567f4a920908e1800b770ec04ffa78080 |
ppc64le
network-observability/network-observability-cli-rhel9@sha256:1587047e407a77f7ac1d963cc9bbfdb5c2472554cad8367f0a96a4699528134d |
network-observability/network-observability-console-plugin-rhel9@sha256:b811f8d5b133d9a90f575d23f7a91e184ef8b6d640fb0cd7732f155d40f51c86 |
network-observability/network-observability-ebpf-agent-rhel9@sha256:d36488d180acdca0e6b0fbe8dbe77af3464d5b1fc3efc9440ed130fec5e71ebe |
network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:b875fece4d49972e278450730f90bb5defa818aa2774dfa0e15d6f36ba50c840 |
network-observability/network-observability-operator-bundle@sha256:ccf531d1181ccd1c6eb9ec45ea20069aa01b2924242596f25e551d055c9a0e1b |
network-observability/network-observability-rhel9-operator@sha256:9c2c0e0b8f9c061983f48fca9c18d7a496d38fbc4f8b9274d2fef39a5824c40a |
s390x
network-observability/network-observability-cli-rhel9@sha256:bd8b5a7f1f9369c1f6fe3782c79b4145c3467b3f82e083e1eb83d76a8df21fdd |
network-observability/network-observability-console-plugin-rhel9@sha256:46cee52d96fee8b3f5cd151c21e5b886841cff53b4d65cb6264d39acd9c6a7cd |
network-observability/network-observability-ebpf-agent-rhel9@sha256:ae64fda5860fa3cbdd9a81d56924cd32d69fbf67804e16cc2e1e5ca6f786dd8b |
network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:8bb22f295ec8087a7163997588a4af0dce8f838407aa83f8bd09190a2943ad1e |
network-observability/network-observability-operator-bundle@sha256:c32c5ec7c6048f652200677c2a9cbde09ed05beeb818e292f21e6a52786b0a02 |
network-observability/network-observability-rhel9-operator@sha256:4f9cdf8c1c22a79d0690b18c363ade514262510f5fbb4062746210005e832134 |
x86_64
network-observability/network-observability-cli-rhel9@sha256:7c2c2c0c0c255c1ef1579b63337d35174a330374a7deaff3c3c1e39ff48e89ee |
network-observability/network-observability-console-plugin-rhel9@sha256:10d159c57623d2e098b401331de93d8d591b78e133785dea89d9694ee76ded0f |
network-observability/network-observability-ebpf-agent-rhel9@sha256:e979023e2e93f1ada9e3fd3e1268b39b4ac1fb9fe51357462e2ac7ddc8c49056 |
network-observability/network-observability-flowlogs-pipeline-rhel9@sha256:87f4f7757826faf37710a88be3c2917b855088e02acb73f43eb7a77f61d00d45 |
network-observability/network-observability-operator-bundle@sha256:3a3c70c990bd3a012453857698433d674b98445e55cc9c5c4ed38eea29eb82b1 |
network-observability/network-observability-rhel9-operator@sha256:349de1a5389f131933bf39235705a4aa8137a8d4be561f66aa2b74f986489fba |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.