CVE-2023-30450

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-30450
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-30450.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-30450
Published
2023-04-08T23:15:06.930Z
Modified
2025-11-20T12:17:37.155954Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

rpk in Redpanda before 23.1.2 mishandles the redpanda.rpcservertls field, leading to (for example) situations in which there is a data type mismatch that cannot be automatically fixed by rpk, and instead a user must reconfigure (while a cluster is turned off) in order to have TLS on broker RPC ports. NOTE: the fix was also backported to the 22.2 and 22.3 branches.

References

Affected packages

Git / github.com/redpanda-data/redpanda

Affected ranges

Type
GIT
Repo
https://github.com/redpanda-data/redpanda
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Fixed

Affected versions

release-0.*

release-0.99.24

release-20.*

release-20.11.1
release-20.11.2
release-20.11.3
release-20.11.4
release-20.11.5
release-20.11.6
release-20.12.1
release-20.12.2
release-20.12.3
release-20.12.4
release-20.12.5

v20.*

v20.12.5
v20.12.6
v20.12.7
v20.12.9

v21.*

v21.1.1
v21.1.2
v21.1.3
v21.1.4
v21.1.5
v21.10.1-beta1
v21.10.1-beta2
v21.11.1-beta1
v21.12.1-wasm-beta1
v21.2.1
v21.2.2
v21.3.1
v21.3.2
v21.3.3
v21.3.4
v21.3.4-beta1
v21.3.5
v21.3.5-beta1
v21.3.5-beta2
v21.3.5-beta3
v21.3.5-beta4
v21.3.5-beta5
v21.3.5-beta6
v21.3.6
v21.3.6-beta1
v21.3.7
v21.4.1
v21.4.10
v21.4.11
v21.4.12
v21.4.13
v21.4.14
v21.4.15
v21.4.16-beta1
v21.4.2
v21.4.3
v21.4.4
v21.4.5
v21.4.6
v21.4.7
v21.4.8
v21.4.9
v21.5.1
v21.5.2
v21.5.2-beta1
v21.5.2-beta2
v21.5.2-beta3
v21.5.3
v21.5.4
v21.5.5
v21.5.6
v21.5.6-beta1
v21.5.7
v21.6.1
v21.6.2
v21.6.3
v21.6.4
v21.6.5
v21.6.6
v21.7.1
v21.7.2
v21.7.3
v21.7.4
v21.7.5
v21.7.6
v21.8.1-beta1
v21.8.1-beta2
v21.9.1-beta1

v22.*

v22.1.1-rc1
v22.2.1
v22.2.1-rc1
v22.2.1-rc2
v22.2.1-rc3
v22.2.1-rc4
v22.2.1-rc5
v22.2.10
v22.2.10-rc1
v22.2.10-rc2
v22.2.10-rc3
v22.2.2
v22.2.2-rc1
v22.2.2-rc2
v22.2.2-rc3
v22.2.3
v22.2.3-rc1
v22.2.4
v22.2.4-rc1
v22.2.5
v22.2.5-rc1
v22.2.6
v22.2.6-rc1
v22.2.7
v22.2.7-rc1
v22.2.7-rc2
v22.2.8
v22.2.8-rc1
v22.2.8-rc2
v22.2.8-rc3
v22.2.8-rc4
v22.2.8-rc5
v22.2.9
v22.2.9-rc1
v22.2.9-rc2
v22.2.9-rc3
v22.3.0-dev
v22.3.1
v22.3.1-rc1
v22.3.1-rc2
v22.3.1-rc3
v22.3.1-rc4
v22.3.1-rc5
v22.3.10
v22.3.10-rc1
v22.3.10-rc2
v22.3.11
v22.3.11-rc1
v22.3.12
v22.3.12-rc1
v22.3.12-rc2
v22.3.12-rc3
v22.3.12-rc4
v22.3.12-rc5
v22.3.13
v22.3.13-rc1
v22.3.14-rc1
v22.3.2
v22.3.3
v22.3.3-rc1
v22.3.4
v22.3.4-rc1
v22.3.5
v22.3.5-rc1
v22.3.5-rc2
v22.3.6
v22.3.6-rc1
v22.3.6-rc2
v22.3.7
v22.3.7-rc1
v22.3.8
v22.3.8-rc1
v22.3.8-rc2
v22.3.9
v22.3.9-rc1

v23.*

v23.1.0-dev
v23.1.1
v23.1.1-rc1
v23.1.1-rc2
v23.1.1-rc3
v23.1.1-rc4
v23.1.1-rc5
v23.1.1-rc6
v23.1.1-rc7
v23.1.1-rc8