🛡 H3lium@infosec.exchange/:~# :blinking_cursor:<p>🔒 Red Hat Security Advisory 🔒</p><p>📦 Product: OpenShift Virtualization<br>🆔 Advisory ID: RHSA-2023:4420-01<br>📅 Issue date: 2023-08-01<br>🔍 CVE Names: CVE-2023-24540</p><p>📜 Summary:<br>Red Hat OpenShift Virtualization release 4.12.5 is now available, featuring updates to packages and images that address various bugs and provide enhancements.</p><p>🛡️ Security Impact:<br>This update has been classified as "Important" by Red Hat Product Security. For detailed severity ratings, please check the Common Vulnerability Scoring System (CVSS) base score for each vulnerability using the provided CVE link(s) in the References section.</p><p>🎯 Relevant releases/architectures:<br><a href="https://infosec.exchange/tags/CNV4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CNV4</span></a> <a href="https://infosec.exchange/tags/RHEL7" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RHEL7</span></a> <a href="https://infosec.exchange/tags/x86_64" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>x86_64</span></a> <a href="https://infosec.exchange/tags/CNV4" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CNV4</span></a> <a href="https://infosec.exchange/tags/RHEL8" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RHEL8</span></a> <a href="https://infosec.exchange/tags/x86_64" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>x86_64</span></a></p><p>📝 Description:<br>OpenShift Virtualization is Red Hat's virtualization solution tailored for Red Hat OpenShift Container Platform.</p><p>This advisory contains OpenShift Virtualization 4.12.5 RPMs.</p><p>🔧 Security Fix(es):<br>CVE-2023-24540: golang: html/template: improper handling of JavaScript whitespace<br>For more information on the security issue(s), including the impact, CVSS score, acknowledgments, and other related details, please refer to the CVE page(s) listed in the References section.</p><p>💡 Solution:<br>To apply this update, including the changes described in this advisory, please follow the instructions at:<br>🔗 <a href="https://access.redhat.com/articles/11258" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">access.redhat.com/articles/112</span><span class="invisible">58</span></a></p><p>🐞 Bugs fixed:</p><ul><li>2196027 - CVE-2023-24540 golang: html/template: improper handling of JavaScript whitespace</li><li>2227593 - Tracker for 4.12.5 RPM</li></ul><p>📦 Package List:<br>CNV 4.12 for RHEL 7:<br>Source:</p><ul><li>kubevirt-4.12.5-1189.el7.src.rpm</li></ul><p>x86_64:</p><ul><li>kubevirt-virtctl-4.12.5-1189.el7.x86_64.rpm</li><li>kubevirt-virtctl-redistributable-4.12.5-1189.el7.x86_64.rpm</li></ul><p>CNV 4.12 for RHEL 8:<br>Source:</p><ul><li>kubevirt-4.12.5-1189.el8.src.rpm</li></ul><p>x86_64:</p><ul><li>kubevirt-virtctl-4.12.5-1189.el8.x86_64.rpm</li><li>kubevirt-virtctl-redistributable-4.12.5-1189.el8.x86_64.rpm</li></ul><p>🔗 References:<br>CVE-2023-24540: <a href="https://access.redhat.com/security/cve/CVE-2023-24540" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">access.redhat.com/security/cve</span><span class="invisible">/CVE-2023-24540</span></a></p>