Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2024:9485 - Security Advisory
Issued:
2024-11-13
Updated:
2024-11-13

RHSA-2024:9485 - Security Advisory

  • Overview
  • Updated Images

Synopsis

Important: Control plane Operators for RHOSO 18.0.3 (Feature Release 1) security update

Type/Severity

Security Advisory: Important

Topic

Control plane Operators for RHOSO 18.0.3 (Feature Release 1).

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Security fix(es):

  • Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. (CVE-2024-34156)
  • When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded. (CVE-2023-45289)
  • When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permitted a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. (CVE-2023-45290)
  • Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates. (CVE-2024-24783)
  • The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers. (CVE-2024-24784)
  • If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the

html/template package, allowing for subsequent actions to inject unexpected content into templates. (CVE-2024-24785)

  • A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. (CVE-2024-24788)
  • Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion. (CVE-2024-34155)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.

Solution

RHOSO OpenStack Podified Control Plane Operators

Affected Products

  • Red Hat OpenStack Services on OpenShift Podifed Operators 1.0 x86_64

Fixes

  • BZ - 2268017 - CVE-2023-45290 golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm
  • BZ - 2268018 - CVE-2023-45289 golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect
  • BZ - 2268019 - CVE-2024-24783 golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
  • BZ - 2268021 - CVE-2024-24784 golang: net/mail: comments in display names are incorrectly handled
  • BZ - 2268022 - CVE-2024-24785 golang: html/template: errors returned from MarshalJSON methods may break template escaping
  • BZ - 2279814 - CVE-2024-24788 golang: net: malformed DNS message can cause infinite loop
  • BZ - 2310527 - CVE-2024-34155 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion
  • BZ - 2310528 - CVE-2024-34156 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
  • OSPRH-10040 - Run Glance pod components at minimum privilege escalation level
  • OSPRH-10141 - Run Manila pod components at minimum privilege escalation level
  • OSPRH-10288 - Run Neutron pod components at minimum privilege escalation level
  • OSPRH-10411 - Nil pointer derefence when using PreProvisioningNetworkData
  • OSPRH-1099 - Support ManilaShare deletion
  • OSPRH-3467 - Glance edge/dcn support
  • OSPRH-6720 - TLS-e not working for glanceAPI Edge instances
  • OSPRH-7817 - Tech Debt - As a cloud operator I would like to roll-back to the old 17.1 based control plane if the adoption process fails
  • OSPRH-8072 - Adding and then removing an glance API definition from OpenStackControlPlane does not clean up spec.glance.apiOverrides
  • OSPRH-8193 - [glance] Modifying osp-secret triggers an almost complete restart of the podified control plane
  • OSPRH-8195 - [swift] Modifying osp-secret triggers an almost complete restart of the podified control plane
  • OSPRH-8290 - [manila] Modifying osp-secret triggers an almost complete restart of the podified control plane
  • OSPRH-9285 - horizon-operator doesn't accept networkAttachment option to assign the additional network for NFS share of glance image upload
  • OSPRH-11068 - openstack-operator-controller-manager crashing with nil pointer deference panic when deployment job fails
  • OSPRH-9371 - Use of lib-common VerifySecret prevents proper requeue in certain operators
  • OSPRH-10639 - Improve how the config will be mounted and consumed in the heat pods
  • OSPRH-9991 - ValidateCertSecrets miss return information on which cert secret is missing
  • OSPRH-10035 - Telemetry can't make progress, yet operator status is "in progress" and no event nor status update on OpenSTackControlPlane CR
  • OSPRH-10195 - Add support for Galera's safe_to_bootstrap to improve bootstrap
  • OSPRH-10612 - Can't change the persistent field of MetricStorage
  • OSPRH-10725 - octavia-operator displays backtraces on startup
  • OSPRH-7610 - Export and scrape RabbitMQ metrics
  • OSPRH-105 - Support Cell deletion
  • OSPRH-6951 - Auto-detect EDPM image checksum details during baremetal provisioning
  • OSPRH-7821 - mariadb-operator may not reconcile galera start properly when it is restarted
  • OSPRH-8038 - Setting the memcached replicas to 0 is allowed but breaks the control plane
  • OSPRH-8058 - Galera.Spec.AdoptionRedirect is not used by the adoption process
  • OSPRH-8069 - Modifying osp-secret triggers an almost complete restart of the podified control plane
  • OSPRH-9411 - mariadb operator cannot reconcile state of a pod in pending phase
  • OSPRH-9908 - SAST: Provide access to secrets via volume mounts instead of setting `valueFrom.secretKeyRef` in `env`
  • OSPRH-8065 - Autoscaling is ignoring prometheusTLS field
  • OSPRH-8074 - telemetry-operator panics when using customMonitoringStack and ScrapeInterval isn't set
  • OSPRH-8118 - OVNDbCluster: ovsdb-server process is not exited gracefully
  • OSPRH-8212 - Improve TERM signal handling in OVNDbCluster startup scripts
  • OSPRH-8508 - Support ipv6 for metrics retrieval
  • OSPRH-8535 - DataplaneNetwork should be optional
  • OSPRH-8582 - telemetry-operator must support empty template
  • OSPRH-9455 - Live migration fails with TLS cert error when ctlplane network is not listed as the first network
  • OSPRH-4128 - Power Consumptions Metrics using CeilometerIpmi
  • OSPRH-10090 - Fix race condition if ring rebalance is needed
  • OSPRH-10282 - Allow to match BMH and EDPM node's hostname one by one
  • OSPRH-1478 - Cinder edge/dcn support
  • OSPRH-2428 - As a cloud operator I would like to adopt my existing 17.1 OpenStack environment where the control plane is running on Baremetal so that I am on a Red Hat supported platform & architecture.
  • OSPRH-3466 - Deploy an arbitrary number of glanceAPI
  • OSPRH-6501 - Golang update to version 1.21 in all modules and submodules
  • OSPRH-8192 - [cinder] Modifying osp-secret triggers an almost complete restart of the podified control plane
  • OSPRH-9910 - Node provisioning should only be possible with configured IPAM
  • OSPRH-6624 - Enable/disable TLS as day 2 operation
  • OSPRH-7324 - Implement Octavia log offloading in the Podified Control Plane
  • OSPRH-8078 - RabbitMQ does not disable TLS when previously enabled

CVEs

  • CVE-2023-45289
  • CVE-2023-45290
  • CVE-2024-6119
  • CVE-2024-6232
  • CVE-2024-24783
  • CVE-2024-24784
  • CVE-2024-24785
  • CVE-2024-24788
  • CVE-2024-34155
  • CVE-2024-34156
  • CVE-2024-45490
  • CVE-2024-45491
  • CVE-2024-45492

References

  • https://access.redhat.com/security/updates/classification/#important

x86_64

rhoso-operators/barbican-rhel9-operator@sha256:9d4c302bf3ef3861b54fc401d1742e91b089e9172c28fcf7d450dac4c50f03ea
rhoso-operators/cinder-rhel9-operator@sha256:5b0a67c7eb1eeda740c1d7659eea8ab51a21427e1ba2ff1714860bc7f01a3ca6
rhoso-operators/designate-rhel9-operator@sha256:a5646a3a3d6f7584538ecddeac5537e26ae6c0f60b36df7ebae1bd527cc982c7
rhoso-operators/glance-rhel9-operator@sha256:a1c8bcc3bc80b8787bed607276084c23bc7891ddb91eba6f145779a8fe481834
rhoso-operators/heat-rhel9-operator@sha256:ea965c08c2c7d31410ed80b8eb808933cc511783f8c69b0d1bd8a17ee9abf19d
rhoso-operators/horizon-rhel9-operator@sha256:17246bbe4f31daffc1614ac6a3d5d90a552b2cdd68d757bd48be6c57d31f6c2e
rhoso-operators/infra-rhel9-operator@sha256:5c873e80bc6a33ac0244e75ef93582e22f211125ed50fd06b4537cc8db15e37e
rhoso-operators/ironic-rhel9-operator@sha256:030589a0e86a20a306c3e9118c3f29ee95d409fc88a1173f174c11556c6ca58c
rhoso-operators/keystone-rhel9-operator@sha256:6d2d87f44b7c0b3b5aff6bc2ad112d4bcd3e5f2a2a157f449842cc9340789392
rhoso-operators/manila-rhel9-operator@sha256:15356683398fada9c162ccc37f150477f39a1c53f55033d07c712ad6aa317e36
rhoso-operators/mariadb-rhel9-operator@sha256:98bcc0d3c4b05d160a615165426c13bb2318597fa126c2fe9a38688d81fd4ea1
rhoso-operators/neutron-rhel9-operator@sha256:850c2f1377fa0a5a0143ed226abccbec78ed03d86adcdc1e9daaa2dd45614d49
rhoso-operators/nova-rhel9-operator@sha256:641657e9340a21d5e82e81407b2b3719df6eed8cd8334171aaa338dde86d6d52
rhoso-operators/octavia-rhel9-operator@sha256:605b6c299ab3bd243638a7896c2f5105fcfddbe92d1d6975ad3819f449c00709
rhoso-operators/openstack-baremetal-agent-rhel9@sha256:f08212d197b81bbcd1e44ffb5e20d2b7327b3b438b103e37065783f9027c020c
rhoso-operators/openstack-baremetal-rhel9-operator@sha256:0960068ccad1929734b174c67a64e06d7afc1851123c117dc942d2873046f808
rhoso-operators/openstack-must-gather-rhel9@sha256:586ab3bab72c0dd76418c6e4fbf49577c289430212567aab495cd7231d52e4fc
rhoso-operators/openstack-rhel9-operator@sha256:7d7de1bbcd1154bb6aa9c1d0e94c1413aad4714b3cbe8d6d2512bca238af3292
rhoso-operators/ovn-rhel9-operator@sha256:cca32c23677bf4ad3405d7151ced32b4963860edd50981b236b8ef636567e982
rhoso-operators/placement-rhel9-operator@sha256:44c1ef6eacfa049e4846dabd182648ccad01df7f5019ac7ea9d98bc8b0e2d95f
rhoso-operators/rabbitmq-cluster-rhel9-operator@sha256:e9f6e20f5e7a11cea3533cebc6834ce36d20007ad3fc866c373e410c66c8195d
rhoso-operators/sg-core-rhel9@sha256:e40fac6ed64076c41c6056df02153011ea9ac575ca018aa1c9c3b8093426f6d4
rhoso-operators/swift-rhel9-operator@sha256:59483bd45a23f40462c37064ec6dc334b8366f6266aa959825d2a8ed7075ff40
rhoso-operators/telemetry-rhel9-operator@sha256:66fefdca3acda5f33d8eefe32abd3a2c1e3665e5ae9456683dca604524001695
rhoso-operators/test-rhel9-operator@sha256:e248484aaea76516e4c504439608f3ccfd5236756521156780ada8a14bf25b98

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility