{"id":"RHSA-2023:4003","summary":"Red Hat Security Advisory: Red Hat Service Interconnect 1.4 Release security update","modified":"2026-04-27T10:02:20Z","published":"2024-10-02T00:15:19Z","related":["GO-2023-1569","GO-2023-1570","GO-2023-1571"],"upstream":["CVE-2022-28327","CVE-2022-2879","CVE-2022-2880","CVE-2022-41715","CVE-2022-41723","CVE-2022-41724","CVE-2022-41725","CVE-2023-24534","CVE-2023-24536","CVE-2023-24537","CVE-2023-24538","CVE-2023-24539","CVE-2023-29400"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:4003"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_service_interconnect"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077689"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2132867"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2132868"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2132872"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2178358"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2178488"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2178492"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184481"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184482"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184483"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184484"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196026"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196029"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4003.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2879"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2879"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2879"},{"type":"ARTICLE","url":"https://github.com/golang/go/issues/54853"},{"type":"ARTICLE","url":"https://github.com/vbatts/tar-split/releases/tag/v0.12.1"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2880"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2880"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2880"},{"type":"ARTICLE","url":"https://github.com/golang/go/issues/54663"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-28327"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-28327"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-28327"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/oecdBNLOml8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41715"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-41715"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41715"},{"type":"ARTICLE","url":"https://github.com/golang/go/issues/55949"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41723"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-41723"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41723"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-vvpx-j8f3-3w6h"},{"type":"ARTICLE","url":"https://go.dev/cl/468135"},{"type":"ARTICLE","url":"https://go.dev/cl/468295"},{"type":"ARTICLE","url":"https://go.dev/issue/57855"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/V0aBFqaFs_E"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2023-1571"},{"type":"ARTICLE","url":"https://vuln.go.dev/ID/GO-2023-1571.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41724"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-41724"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41724"},{"type":"ARTICLE","url":"https://go.dev/cl/468125"},{"type":"ARTICLE","url":"https://go.dev/issue/58001"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2023-1570"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-41725"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-41725"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41725"},{"type":"ARTICLE","url":"https://go.dev/cl/468124"},{"type":"ARTICLE","url":"https://go.dev/issue/58006"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2023-1569"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24534"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-24534"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24534"},{"type":"ARTICLE","url":"https://go.dev/issue/58975"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/Xdv6JL9ENs8"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24536"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-24536"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24536"},{"type":"ARTICLE","url":"https://go.dev/issue/59153"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24537"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-24537"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24537"},{"type":"ARTICLE","url":"https://github.com/golang/go/issues/59180"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24538"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-24538"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24538"},{"type":"ARTICLE","url":"https://github.com/golang/go/issues/59234"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-24539"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-24539"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-24539"},{"type":"ARTICLE","url":"https://github.com/golang/go/issues/59720"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/MEb0UyuSMsU"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-29400"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-29400"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-29400"},{"type":"ARTICLE","url":"https://go.dev/issue/59722"}],"affected":[{"package":{"name":"skupper-cli","ecosystem":"Red Hat:service_interconnect:1::el8","purl":"pkg:rpm/redhat/skupper-cli"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.4.1-2.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:4003.json"}},{"package":{"name":"skupper-cli","ecosystem":"Red Hat:service_interconnect:1::el9","purl":"pkg:rpm/redhat/skupper-cli"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.4.1-2.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:4003.json"}},{"package":{"name":"skupper-router","ecosystem":"Red Hat:service_interconnect:1::el8","purl":"pkg:rpm/redhat/skupper-router"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.1-2.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:4003.json"}},{"package":{"name":"skupper-router-common","ecosystem":"Red Hat:service_interconnect:1::el8","purl":"pkg:rpm/redhat/skupper-router-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.1-2.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:4003.json"}},{"package":{"name":"skupper-router-debuginfo","ecosystem":"Red Hat:service_interconnect:1::el8","purl":"pkg:rpm/redhat/skupper-router-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.1-2.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:4003.json"}},{"package":{"name":"skupper-router-debugsource","ecosystem":"Red Hat:service_interconnect:1::el8","purl":"pkg:rpm/redhat/skupper-router-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.1-2.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:4003.json"}},{"package":{"name":"skupper-router-docs","ecosystem":"Red Hat:service_interconnect:1::el8","purl":"pkg:rpm/redhat/skupper-router-docs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.1-2.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:4003.json"}},{"package":{"name":"skupper-router-tools","ecosystem":"Red Hat:service_interconnect:1::el8","purl":"pkg:rpm/redhat/skupper-router-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.1-2.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:4003.json"}},{"package":{"name":"skupper-router","ecosystem":"Red Hat:service_interconnect:1::el9","purl":"pkg:rpm/redhat/skupper-router"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.1-2.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:4003.json"}},{"package":{"name":"skupper-router-common","ecosystem":"Red Hat:service_interconnect:1::el9","purl":"pkg:rpm/redhat/skupper-router-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.1-2.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:4003.json"}},{"package":{"name":"skupper-router-debuginfo","ecosystem":"Red Hat:service_interconnect:1::el9","purl":"pkg:rpm/redhat/skupper-router-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.1-2.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:4003.json"}},{"package":{"name":"skupper-router-debugsource","ecosystem":"Red Hat:service_interconnect:1::el9","purl":"pkg:rpm/redhat/skupper-router-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.1-2.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:4003.json"}},{"package":{"name":"skupper-router-docs","ecosystem":"Red Hat:service_interconnect:1::el9","purl":"pkg:rpm/redhat/skupper-router-docs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.1-2.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:4003.json"}},{"package":{"name":"skupper-router-tools","ecosystem":"Red Hat:service_interconnect:1::el9","purl":"pkg:rpm/redhat/skupper-router-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.4.1-2.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:4003.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}