{"id":"RHSA-2023:1655","summary":"Red Hat Security Advisory: OpenShift Container Platform 4.10.56 security update","modified":"2026-05-06T10:01:42Z","published":"2024-09-30T07:06:40Z","upstream":["CVE-2022-31690","CVE-2022-31692","CVE-2022-3172","CVE-2022-42889","CVE-2023-24422","CVE-2023-25725","CVE-2023-27898","CVE-2023-27899","CVE-2023-27903","CVE-2023-27904"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:1655"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#critical"},{"type":"ARTICLE","url":"https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2127804"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135435"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162200"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162206"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2164278"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177626"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177629"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177632"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2177634"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1655.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3172"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3172"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3172"},{"type":"ARTICLE","url":"https://github.com/kubernetes/kubernetes/issues/112513"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-31690"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-31690"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31690"},{"type":"ARTICLE","url":"https://spring.io/security/cve-2022-31690"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-31692"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-31692"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-31692"},{"type":"ARTICLE","url":"https://spring.io/security/cve-2022-31692"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42889"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42889"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42889"},{"type":"ARTICLE","url":"https://blogs.apache.org/security/entry/cve-2022-42889"},{"type":"ARTICLE","url":"https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om"},{"type":"ARTICLE","url":"https://seclists.org/oss-sec/2022/q4/22"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24422"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-24422"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24422"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3016"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25725"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2169089"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-25725"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25725"},{"type":"ARTICLE","url":"https://www.haproxy.com/blog/february-2023-header-parser-fixed/"},{"type":"ARTICLE","url":"https://www.mail-archive.com/haproxy@formilux.org/msg43229.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-27898"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-27898"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27898"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3037"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-27899"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-27899"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27899"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-2823"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-27903"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-27903"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27903"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-3058"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-27904"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-27904"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27904"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-03-08/#SECURITY-2120"}],"affected":[{"package":{"name":"openshift","ecosystem":"Red Hat:openshift:4.10::el7","purl":"pkg:rpm/redhat/openshift"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.0-202303221742.p0.g16bcd69.assembly.stream.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1655.json"}},{"package":{"name":"openshift-hyperkube","ecosystem":"Red Hat:openshift:4.10::el7","purl":"pkg:rpm/redhat/openshift-hyperkube"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.0-202303221742.p0.g16bcd69.assembly.stream.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1655.json"}},{"package":{"name":"openshift","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/openshift"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.0-202303221742.p0.g16bcd69.assembly.stream.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1655.json"}},{"package":{"name":"openshift-hyperkube","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/openshift-hyperkube"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.0-202303221742.p0.g16bcd69.assembly.stream.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1655.json"}},{"package":{"name":"jenkins","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/jenkins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.387.1.1680701869-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1655.json"}},{"package":{"name":"jenkins-2-plugins","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/jenkins-2-plugins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.1680703106-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1655.json"}},{"package":{"name":"haproxy","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/haproxy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.19-4.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1655.json"}},{"package":{"name":"haproxy-debugsource","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/haproxy-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.19-4.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1655.json"}},{"package":{"name":"haproxy22","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/haproxy22"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.19-4.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1655.json"}},{"package":{"name":"haproxy22-debuginfo","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/haproxy22-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.19-4.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:1655.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}