Red Hat 9008 Published by

A Node Health Check Operator 0.3.1 security update has been released for Red Hat Enterprise Linux 8.



RHSA-2022:6187-01: Important: Node Health Check Operator 0.3.1 security update



=====================================================================
Red Hat Security Advisory

Synopsis: Important: Node Health Check Operator 0.3.1 security update
Advisory ID: RHSA-2022:6187-01
Product: RHWA
Advisory URL:   https://access.redhat.com/errata/RHSA-2022:6187
Issue date: 2022-08-25
CVE Names: CVE-2022-1705 CVE-2022-28327 CVE-2022-30631
=====================================================================

1. Summary:

An update for node-healthcheck-operator-bundle-container and
node-healthcheck-operator-container is now available for Node Healthcheck
Operator 0.3 for RHEL 8. This Operator is delivered by Red Hat Workload
Availability.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

This is an updated release of the Node Health Check Operator. You can use
the Node Health Check Operator to deploy the Node Health Check controller.
The controller identifies unhealthy nodes and uses the Self Node
Remediation Operator to remediate the unhealthy nodes.

Security Fix(es):

* golang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)

* golang: net/http: improper sanitization of Transfer-Encoding header
(CVE-2022-1705)

* golang: crypto/elliptic: panic caused by oversized scalar
(CVE-2022-28327)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, see the CVE page(s)
listed in the References section.

3. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, see:

  https://access.redhat.com/articles/11258

4. Bugs fixed (  https://bugzilla.redhat.com/):

2077689 - CVE-2022-28327 golang: crypto/elliptic: panic caused by oversized scalar
2107342 - CVE-2022-30631 golang: compress/gzip: stack exhaustion in Reader.Read
2107374 - CVE-2022-1705 golang: net/http: improper sanitization of Transfer-Encoding header

5. References:

  https://access.redhat.com/security/cve/CVE-2022-1705
  https://access.redhat.com/security/cve/CVE-2022-28327
  https://access.redhat.com/security/cve/CVE-2022-30631
  https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is . More contact
details at   https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.