{"id":"RHSA-2024:0043","summary":"Red Hat Security Advisory: Red Hat build of MicroShift 4.16.0 security update","modified":"2026-04-04T10:02:12Z","published":"2024-10-01T23:06:16Z","related":["GO-2024-2611"],"upstream":["CVE-2024-24786","CVE-2024-3177"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0043"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268046"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2274118"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-21901"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-23336"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-24444"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-24689"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-25030"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-25784"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-27849"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-29037"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-29847"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-30039"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-30807"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-30833"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-31739"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-32946"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/OCPBUGS-33588"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0043.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-3177"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-3177"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3177"},{"type":"ARTICLE","url":"https://discuss.kubernetes.io/t/security-advisory-cve-2024-3177-bypassing-mountable-secrets-policy-imposed-by-the-serviceaccount-admission-plugin/27905"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-24786"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-24786"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-24786"},{"type":"ARTICLE","url":"https://go.dev/cl/569356"},{"type":"ARTICLE","url":"https://groups.google.com/g/golang-announce/c/ArQ6CDgtEjY/"},{"type":"ADVISORY","url":"https://pkg.go.dev/vuln/GO-2024-2611"}],"affected":[{"package":{"name":"microshift","ecosystem":"Red Hat:openshift:4.16::el9","purl":"pkg:rpm/redhat/microshift"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.16.0-202406260523.p0.gc5a37df.assembly.4.16.0.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0043.json"}},{"package":{"name":"microshift-greenboot","ecosystem":"Red Hat:openshift:4.16::el9","purl":"pkg:rpm/redhat/microshift-greenboot"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.16.0-202406260523.p0.gc5a37df.assembly.4.16.0.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0043.json"}},{"package":{"name":"microshift-multus","ecosystem":"Red Hat:openshift:4.16::el9","purl":"pkg:rpm/redhat/microshift-multus"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.16.0-202406260523.p0.gc5a37df.assembly.4.16.0.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0043.json"}},{"package":{"name":"microshift-multus-release-info","ecosystem":"Red Hat:openshift:4.16::el9","purl":"pkg:rpm/redhat/microshift-multus-release-info"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.16.0-202406260523.p0.gc5a37df.assembly.4.16.0.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0043.json"}},{"package":{"name":"microshift-networking","ecosystem":"Red Hat:openshift:4.16::el9","purl":"pkg:rpm/redhat/microshift-networking"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.16.0-202406260523.p0.gc5a37df.assembly.4.16.0.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0043.json"}},{"package":{"name":"microshift-olm","ecosystem":"Red Hat:openshift:4.16::el9","purl":"pkg:rpm/redhat/microshift-olm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.16.0-202406260523.p0.gc5a37df.assembly.4.16.0.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0043.json"}},{"package":{"name":"microshift-olm-release-info","ecosystem":"Red Hat:openshift:4.16::el9","purl":"pkg:rpm/redhat/microshift-olm-release-info"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.16.0-202406260523.p0.gc5a37df.assembly.4.16.0.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0043.json"}},{"package":{"name":"microshift-release-info","ecosystem":"Red Hat:openshift:4.16::el9","purl":"pkg:rpm/redhat/microshift-release-info"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.16.0-202406260523.p0.gc5a37df.assembly.4.16.0.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0043.json"}},{"package":{"name":"microshift-selinux","ecosystem":"Red Hat:openshift:4.16::el9","purl":"pkg:rpm/redhat/microshift-selinux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.16.0-202406260523.p0.gc5a37df.assembly.4.16.0.el9"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:0043.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}