{"id":"RHSA-2022:1620","summary":"Red Hat Security Advisory: OpenShift Container Platform 4.6.57 packages and security update","modified":"2026-03-21T10:03:24Z","published":"2024-09-16T07:45:06Z","upstream":["CVE-2022-0711","CVE-2022-25173","CVE-2022-25174","CVE-2022-25175","CVE-2022-25176","CVE-2022-25177","CVE-2022-25178","CVE-2022-25179","CVE-2022-25180","CVE-2022-25181","CVE-2022-25182","CVE-2022-25183","CVE-2022-25184"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:1620"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053666"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055719"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055733"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055734"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055787"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055788"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055789"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055792"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055795"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055797"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055798"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055802"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2055804"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1620.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0711"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0711"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0711"},{"type":"ARTICLE","url":"https://www.mail-archive.com/haproxy@formilux.org/msg41833.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25173"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25173"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25173"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25174"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25174"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25174"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25175"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25175"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25175"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25176"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25176"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25176"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25177"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25177"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25177"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25178"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25178"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25178"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25179"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25179"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25179"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25180"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25180"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25180"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25181"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25181"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25181"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25182"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25182"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25182"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25183"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25183"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25183"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25184"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25184"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25184"}],"affected":[{"package":{"name":"haproxy","ecosystem":"Red Hat:openshift:4.6::el7","purl":"pkg:rpm/redhat/haproxy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.16-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1620.json"}},{"package":{"name":"haproxy-debuginfo","ecosystem":"Red Hat:openshift:4.6::el7","purl":"pkg:rpm/redhat/haproxy-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.16-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1620.json"}},{"package":{"name":"haproxy20","ecosystem":"Red Hat:openshift:4.6::el7","purl":"pkg:rpm/redhat/haproxy20"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.16-3.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1620.json"}},{"package":{"name":"haproxy","ecosystem":"Red Hat:openshift:4.6::el8","purl":"pkg:rpm/redhat/haproxy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.16-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1620.json"}},{"package":{"name":"haproxy-debugsource","ecosystem":"Red Hat:openshift:4.6::el8","purl":"pkg:rpm/redhat/haproxy-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.16-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1620.json"}},{"package":{"name":"haproxy20","ecosystem":"Red Hat:openshift:4.6::el8","purl":"pkg:rpm/redhat/haproxy20"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.16-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1620.json"}},{"package":{"name":"haproxy20-debuginfo","ecosystem":"Red Hat:openshift:4.6::el8","purl":"pkg:rpm/redhat/haproxy20-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.16-5.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1620.json"}},{"package":{"name":"jenkins-2-plugins","ecosystem":"Red Hat:openshift:4.6::el8","purl":"pkg:rpm/redhat/jenkins-2-plugins"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.6.1650364520-1.el8"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:1620.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}