exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2022-5189-01

Red Hat Security Advisory 2022-5189-01
Posted Jun 27, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-5189-01 - Updated images are now available for Red Hat Advanced Cluster Security for Kubernetes (RHACS). The updated image includes bug and security fixes.

tags | advisory
systems | linux, redhat
advisories | CVE-2022-1271, CVE-2022-1902
SHA-256 | 05d46ef42f74433858b6f2e938349ce27fb3548952eba8e4c2deb1465a6092a4

Red Hat Security Advisory 2022-5189-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: RHACS 3.70 security update
Advisory ID: RHSA-2022:5189-01
Product: RHACS
Advisory URL: https://access.redhat.com/errata/RHSA-2022:5189
Issue date: 2022-06-27
CVE Names: CVE-2022-1271 CVE-2022-1902
====================================================================
1. Summary:

Updated images are now available for Red Hat Advanced Cluster Security for
Kubernetes (RHACS). The updated image includes bug and security fixes.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Release of ACS 3.70.1

Security Fix(es):

* stackrox: Improper sanitization allows users to retrieve Notifier secrets
from GraphQL API in plaintext (CVE-2022-1902)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

If you are using the RHACS 3.70.0, you are advised to upgrade to patch
release 3.70.1.

4. Bugs fixed (https://bugzilla.redhat.com/):

2090957 - CVE-2022-1902 stackrox: Improper sanitization allows users to retrieve Notifier secrets from GraphQL API in plaintext

5. JIRA issues fixed (https://issues.jboss.org/):

ROX-11452 - Release RHACS 3.70.1

6. References:

https://access.redhat.com/security/cve/CVE-2022-1271
https://access.redhat.com/security/cve/CVE-2022-1902
https://access.redhat.com/security/updates/classification/#important

7. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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IZou
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close