QID 240241

Date Published: 2022-04-28

QID 240241: Red Hat OpenShift Container Platform 5 Security Update (RHSA-2022:1420)

Red Hat openshift container platform is Red Hat's cloud computing kubernetes application platform solution designed for on-premise or private cloud deployments.

Security Fix(es):
  • workflow-cps: os command execution through crafted scm contents (cve-2022-25173)
  • workflow-cps-global-lib: os command execution through crafted scm contents (cve-2022-25174)
  • workflow-multibranch: os command execution through crafted scm contents (cve-2022-25175)
  • workflow-cps-global-lib: sandbox bypass vulnerability (cve-2022-25181)
  • workflow-cps-global-lib: sandbox bypass vulnerability (cve-2022-25182)
  • workflow-cps-global-lib: sandbox bypass vulnerability (cve-2022-25183)
  • xstream: injecting highly recursive collections or maps can cause a dos (cve-2021-43859)
  • workflow-cps: pipeline-related plugins follow symbolic links or do not limit path names (cve-2022-25176)
  • workflow-cps-global-lib: pipeline-related plugins follow symbolic links or do not limit path names (cve-2022-25177)
  • workflow-cps-global-lib: pipeline-related plugins follow symbolic links or do not limit path names (cve-2022-25178)
  • workflow-multibranch: pipeline-related plugins follow symbolic links or do not limit path names (cve-2022-25179)
  • workflow-cps: password parameters are included from the original build in replayed builds (cve-2022-25180)
  • pipeline-build-step: password parameter default values exposed (cve-2022-25184)

Affected Products:

  • Red Hat openshift container platform 3.11 x86_64
  • Red Hat openshift container platform for power 3.11 ppc64le



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 6.5 severity.
  • Solution
    Refer to Red Hat security advisory RHSA-2022:1420 for updates and patch information.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    RHSA-2022:1420 Red Hat Enterprise Linux URL Logo access.redhat.com/errata/RHSA-2022:1420