exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2023-2104-01

Red Hat Security Advisory 2023-2104-01
Posted May 4, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-2104-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2020-10735, CVE-2021-28861, CVE-2022-25881, CVE-2022-2873, CVE-2022-40897, CVE-2022-41222, CVE-2022-4269, CVE-2022-4304, CVE-2022-4378, CVE-2022-43945, CVE-2022-4415, CVE-2022-4450, CVE-2022-45061, CVE-2022-48303
SHA-256 | d7518abfdd2ac009bc17d82bebd1a4b25522cb7e7ce34f44d42b7e72b887fd7b

Red Hat Security Advisory 2023-2104-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat Advanced Cluster Management 2.5.8 security updates and bug fixes
Advisory ID: RHSA-2023:2104-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2023:2104
Issue date: 2023-05-03
CVE Names: CVE-2020-10735 CVE-2021-28861 CVE-2022-2873
CVE-2022-4269 CVE-2022-4304 CVE-2022-4378
CVE-2022-4415 CVE-2022-4450 CVE-2022-25881
CVE-2022-40897 CVE-2022-41222 CVE-2022-43945
CVE-2022-45061 CVE-2022-48303 CVE-2023-0215
CVE-2023-0266 CVE-2023-0286 CVE-2023-0361
CVE-2023-0386 CVE-2023-23916
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.5.8 General
Availability release images, which fix bugs and security updates container
images.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/

Security fix(es):
* CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service
(ReDoS) vulnerability

Jira issues addressed:

* ACM-4683: memcached setting max_item_size is not populated
* ACM-4736: Policies with a dot in their names don't work

3. Solution:

For Red Hat Advanced Cluster Management for Kubernetes, see the following
documentation, which will be updated shortly for this release, for
important
instructions about installing this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing

4. Bugs fixed (https://bugzilla.redhat.com/):

2165824 - CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability

5. JIRA issues fixed (https://issues.jboss.org/):

ACM-4736 - [ACM 2.5] Policies with a dot in their names don't work

6. References:

https://access.redhat.com/security/cve/CVE-2020-10735
https://access.redhat.com/security/cve/CVE-2021-28861
https://access.redhat.com/security/cve/CVE-2022-2873
https://access.redhat.com/security/cve/CVE-2022-4269
https://access.redhat.com/security/cve/CVE-2022-4304
https://access.redhat.com/security/cve/CVE-2022-4378
https://access.redhat.com/security/cve/CVE-2022-4415
https://access.redhat.com/security/cve/CVE-2022-4450
https://access.redhat.com/security/cve/CVE-2022-25881
https://access.redhat.com/security/cve/CVE-2022-40897
https://access.redhat.com/security/cve/CVE-2022-41222
https://access.redhat.com/security/cve/CVE-2022-43945
https://access.redhat.com/security/cve/CVE-2022-45061
https://access.redhat.com/security/cve/CVE-2022-48303
https://access.redhat.com/security/cve/CVE-2023-0215
https://access.redhat.com/security/cve/CVE-2023-0266
https://access.redhat.com/security/cve/CVE-2023-0286
https://access.redhat.com/security/cve/CVE-2023-0361
https://access.redhat.com/security/cve/CVE-2023-0386
https://access.redhat.com/security/cve/CVE-2023-23916
https://access.redhat.com/security/updates/classification/#moderate

7. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBZFL0DNzjgjWX9erEAQhNkg/7BrVgowCiZKm2SM1bjP9nN71GPiG+FxpO
sBRY0xZ0MogINzd7Ci2Wo6zmwIxyqa/rq8fWxCZCopE3DkeChEHYMQVxMTYXBdWc
lHsVkVWV6qOF/9RBxEpwO26VyGJVD58PhACIzQ/y/l6RAcOwTIv6+CbmDXM3pu/k
SaWMO2Qaw1IrVnSSeQ6Va1AL1o0Bdm0+CgHQJUehuNOdDpDmf6Zb+yI2fgBfk/ks
VB02L66DC3dk2kla8O8Rxwr7SlpQxdndPEphRP1oWI6pmR3QBFMQHqtcn++ypZlK
OHdvaW/vcqrLWNa6kQY1NuEjhLQ3qN+VOGaiv1m/dt7852qJ0Orhr1w6I276WOab
c2rNPC/l0kkIDbBwjVt+13B7Il39PjB+m0UCnFL1dEpAikhp+bc6mnZvIsgwEvPE
jjlyS3m+c+bnEPCgIDe2OcwMoGTsb8lduaJwKhJ5aCiAmoCe9xSPjbpXiExT8Blt
gldQaaCee3p7MdSwXpRgyblOG4Q1pX+96cR5clYtqRUOwwFb3DQtK+GiBhKTxrUh
Nb7wqAS22NubO4TX7hww5nNyvatV8wLsZbyPps014D0SJMO7x+vFlJLWnXDjOz8A
O5XZb6VvBC4eG5KTGAoSGc8cUmD/iC1/VXbAOWDbMcqjWNAD+BkSigmIWq8E2aal
0j37gsiUnr8=
=53oZ
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close