Red Hat Security Advisory 2023-4575-01 - VolSync is a Kubernetes operator that enables asynchronous replication of persistent volumes within a cluster, or across clusters.
a98593a8060ade811648ba5d5dd712824690b84a705e28c8fe1981b12209ee79
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: VolSync 0.5.4 security fixes and enhancements
Advisory ID: RHSA-2023:4575-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2023:4575
Issue date: 2023-08-08
CVE Names: CVE-2020-24736 CVE-2022-36227 CVE-2023-0361
CVE-2023-1667 CVE-2023-2283 CVE-2023-3089
CVE-2023-26604 CVE-2023-27535 CVE-2023-38408
=====================================================================
1. Summary:
VolSync v0.5.4 security fixes and enhancements
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.
2. Description:
VolSync is a Kubernetes operator that enables asynchronous replication of
persistent volumes within a cluster, or across clusters. After deploying
the VolSync operator, it can create and maintain copies of your persistent
data.
For more information about VolSync, see:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/add-ons/add-ons-overview#volsync
or the VolSync open source community website at:
https://volsync.readthedocs.io/en/stable/.
This advisory contains enhancements and updates to the VolSync container
images.
Security fix(es):
* CVE-2023-3089 openshift: OCP & FIPS mode
3. Solution:
For details on how to install VolSync, refer to:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/add-ons/add-ons-overview#volsync-rep
4. Bugs fixed (https://bugzilla.redhat.com/):
2212085 - CVE-2023-3089 openshift: OCP & FIPS mode
5. References:
https://access.redhat.com/security/cve/CVE-2020-24736
https://access.redhat.com/security/cve/CVE-2022-36227
https://access.redhat.com/security/cve/CVE-2023-0361
https://access.redhat.com/security/cve/CVE-2023-1667
https://access.redhat.com/security/cve/CVE-2023-2283
https://access.redhat.com/security/cve/CVE-2023-3089
https://access.redhat.com/security/cve/CVE-2023-26604
https://access.redhat.com/security/cve/CVE-2023-27535
https://access.redhat.com/security/cve/CVE-2023-38408
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/security/vulnerabilities/RHSB-2023-001
6. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=AN0W
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce