Red Hat Security Advisory 2023-2104-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.
d7518abfdd2ac009bc17d82bebd1a4b25522cb7e7ce34f44d42b7e72b887fd7b
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Red Hat Advanced Cluster Management 2.5.8 security updates and bug fixes
Advisory ID: RHSA-2023:2104-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2023:2104
Issue date: 2023-05-03
CVE Names: CVE-2020-10735 CVE-2021-28861 CVE-2022-2873
CVE-2022-4269 CVE-2022-4304 CVE-2022-4378
CVE-2022-4415 CVE-2022-4450 CVE-2022-25881
CVE-2022-40897 CVE-2022-41222 CVE-2022-43945
CVE-2022-45061 CVE-2022-48303 CVE-2023-0215
CVE-2023-0266 CVE-2023-0286 CVE-2023-0361
CVE-2023-0386 CVE-2023-23916
=====================================================================
1. Summary:
Red Hat Advanced Cluster Management for Kubernetes 2.5.8 General
Availability release images, which fix bugs and security updates container
images.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.
2. Description:
Red Hat Advanced Cluster Management for Kubernetes 2.5.8 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/
Security fix(es):
* CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service
(ReDoS) vulnerability
Jira issues addressed:
* ACM-4683: memcached setting max_item_size is not populated
* ACM-4736: Policies with a dot in their names don't work
3. Solution:
For Red Hat Advanced Cluster Management for Kubernetes, see the following
documentation, which will be updated shortly for this release, for
important
instructions about installing this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing
4. Bugs fixed (https://bugzilla.redhat.com/):
2165824 - CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability
5. JIRA issues fixed (https://issues.jboss.org/):
ACM-4736 - [ACM 2.5] Policies with a dot in their names don't work
6. References:
https://access.redhat.com/security/cve/CVE-2020-10735
https://access.redhat.com/security/cve/CVE-2021-28861
https://access.redhat.com/security/cve/CVE-2022-2873
https://access.redhat.com/security/cve/CVE-2022-4269
https://access.redhat.com/security/cve/CVE-2022-4304
https://access.redhat.com/security/cve/CVE-2022-4378
https://access.redhat.com/security/cve/CVE-2022-4415
https://access.redhat.com/security/cve/CVE-2022-4450
https://access.redhat.com/security/cve/CVE-2022-25881
https://access.redhat.com/security/cve/CVE-2022-40897
https://access.redhat.com/security/cve/CVE-2022-41222
https://access.redhat.com/security/cve/CVE-2022-43945
https://access.redhat.com/security/cve/CVE-2022-45061
https://access.redhat.com/security/cve/CVE-2022-48303
https://access.redhat.com/security/cve/CVE-2023-0215
https://access.redhat.com/security/cve/CVE-2023-0266
https://access.redhat.com/security/cve/CVE-2023-0286
https://access.redhat.com/security/cve/CVE-2023-0361
https://access.redhat.com/security/cve/CVE-2023-0386
https://access.redhat.com/security/cve/CVE-2023-23916
https://access.redhat.com/security/updates/classification/#moderate
7. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=53oZ
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce