- Issued:
- 2025-02-11
- Updated:
- 2025-02-11
RHSA-2025:1333 - Security Advisory
Synopsis
Important: Gatekeeper v3.14.3
Type/Severity
Security Advisory: Important
Topic
Gatekeeper v3.14.3
Gatekeeper is a validating webhook with auditing capabilities that can
enforce custom resource definition-based policies that are run with the
Open Policy Agent (OPA). Gatekeeper is supported through a Red Hat Advanced
Cluster Management for Kubernetes subscription.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.
Description
Gatekeeper v3.14.3
Starting in v3.14.3, users can specify a `containerArguments` list of names
and values for both the audit and webhook configurations to be passed to
the respective deployment. These will be ignored if the argument has
already been set by the operator or specifies an argument listed in the
deny list.
Starting in v3.14.3, the following namespaces are exempt from admission
control:
- kube-*
- multicluster-engine
- hypershift
- hive
- rhacs-operator
- open-cluster-*
- openshift-*
To disable the default exempt namespaces, set the namespaces you want on
the object.
Security fix(es):
- golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback might cause authorization bypass in golang.org/x/crypto (CVE-2024-45337)
- golang.org/x/net/html: Non-linear parsing of case-insensitive content in
golang.org/x/net/html (CVE-2024-45338)
Additional Release Notes:
Solution
For more information, see the following resources:
- See the Gatekeeper
documentation: https://open-policy-agent.github.io/gatekeeper/website/docs/.
- For support and troubleshooting, Gatekeeper is supported through a Red Hat Advanced Cluster Management for
Kubernetes subscription:
https://access.redhat.com/products/red-hat-advanced-cluster-management-for-kubernetes.
- The Open Policy Agent Gatekeeper community collaborates on Slack. Join the
#opa-gatekeeper channel: https://openpolicyagent.slack.com/archives/CDTN970AX.
- Open issues on the Gatekeeper GitHub repository: https://github.com/open-policy-agent/gatekeeper/issues.
- See the installation and upgrade documentation: https://open-policy-agent.github.io/gatekeeper/website/docs/install.
Affected Products
- Gatekeeper 3.14 x86_64
Fixes
- BZ - 2331720 - CVE-2024-45337 golang.org/x/crypto/ssh: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
- BZ - 2333122 - CVE-2024-45338 golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html
- HYPBLD-547 - New Deliverable Request for Gatekeeper 3.14.3
aarch64
gatekeeper/gatekeeper-rhel9@sha256:2e14b2661e4bc2d592862c2cc62993ad25c016166157d0566d798830b9da17c5 |
gatekeeper/gatekeeper-rhel9-operator@sha256:4a839671cab110692b666eb52220c60e2372e65fa0ebccb59638469e3c4759b2 |
ppc64le
gatekeeper/gatekeeper-rhel9@sha256:0750fea44fdbb31437d102b7f0e3878fc5bbc79284c1ffb8fbafb7586f7b2b4d |
gatekeeper/gatekeeper-rhel9-operator@sha256:242dc311770f135c2e8e90213d2df37be4efbe9d933a6002d14bf8e0189c2240 |
s390x
gatekeeper/gatekeeper-rhel9@sha256:eb043a5480b483f90e656a4cd4189b6672c6856072deaaad7f082bba9818886d |
gatekeeper/gatekeeper-rhel9-operator@sha256:d04a5d2ee3b584a2d5a6c00c526466fe83c6f1ffa59cfea9f808fcb6b6389ea4 |
x86_64
gatekeeper/gatekeeper-operator-bundle@sha256:e2a1515489022d6ae4a310f8a9c6432084ec6f0ca83e02401cbba17d99c5ec3c |
gatekeeper/gatekeeper-rhel9@sha256:2a5ea0af3692ba39a4dfef001596015690079068bc3f6ccbf02bfbcffac240ab |
gatekeeper/gatekeeper-rhel9-operator@sha256:5a598b8847f91274791e75c8338c177774fb1557d5ca600e90da5a59a4afb82a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.