{"id":"RHSA-2023:3625","summary":"Red Hat Security Advisory: OpenShift Container Platform 4.10.62 security update","modified":"2026-03-21T10:05:46Z","published":"2024-09-30T16:35:20Z","upstream":["CVE-2022-41966","CVE-2023-20860","CVE-2023-32977","CVE-2023-32979","CVE-2023-32980","CVE-2023-32981"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:3625"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2170431"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2180528"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207830"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207831"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207833"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2207835"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3625.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41966"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-41966"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41966"},{"type":"ARTICLE","url":"https://github.com/x-stream/xstream/security/advisories/GHSA-j563-grx4-pjpv"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-20860"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-20860"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-20860"},{"type":"ARTICLE","url":"https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-32977"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-32977"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32977"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3042"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-32979"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-32979"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32979"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3088%20(1)"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-32980"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-32980"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32980"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3088%20(2)"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-32981"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-32981"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32981"},{"type":"ARTICLE","url":"https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2196"}],"affected":[{"package":{"name":"jenkins","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/jenkins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.401.1.1685677065-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:3625.json"}},{"package":{"name":"jenkins-2-plugins","ecosystem":"Red Hat:openshift:4.10::el8","purl":"pkg:rpm/redhat/jenkins-2-plugins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.1685679861-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:3625.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}