Red Hat Security Advisory 2023-4576-01 - VolSync is a Kubernetes operator that enables asynchronous replication of persistent volumes within a cluster, or across clusters.
b9b138ef5ed2017d1d6071fb95c69743b0800e58f2f41055d4d6bcb0d2caee06
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: VolSync 0.6.3 security fixes and enhancements
Advisory ID: RHSA-2023:4576-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2023:4576
Issue date: 2023-08-08
CVE Names: CVE-2020-24736 CVE-2022-35252 CVE-2022-36227
CVE-2022-43552 CVE-2023-0361 CVE-2023-1667
CVE-2023-2283 CVE-2023-3089 CVE-2023-24329
CVE-2023-26604 CVE-2023-27535 CVE-2023-38408
=====================================================================
1. Summary:
VolSync v0.6.3 security fixes and enhancements
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE links in the References section.
2. Description:
VolSync is a Kubernetes operator that enables asynchronous replication of
persistent volumes within a cluster, or across clusters. After deploying
the VolSync operator, it can create and maintain copies of your persistent
data.
For more information about VolSync, see:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/add-ons/add-ons-overview#volsync
or the VolSync open source community website at:
https://volsync.readthedocs.io/en/stable/.
This advisory contains enhancements and updates to the VolSync container
images.
Security fix(es): * CVE-2023-3089 openshift: OCP & FIPS mode
3. Solution:
For details on how to install VolSync, refer to:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/add-ons/add-ons-overview#volsync-rep
4. Bugs fixed (https://bugzilla.redhat.com/):
2212085 - CVE-2023-3089 openshift: OCP & FIPS mode
5. References:
https://access.redhat.com/security/cve/CVE-2020-24736
https://access.redhat.com/security/cve/CVE-2022-35252
https://access.redhat.com/security/cve/CVE-2022-36227
https://access.redhat.com/security/cve/CVE-2022-43552
https://access.redhat.com/security/cve/CVE-2023-0361
https://access.redhat.com/security/cve/CVE-2023-1667
https://access.redhat.com/security/cve/CVE-2023-2283
https://access.redhat.com/security/cve/CVE-2023-3089
https://access.redhat.com/security/cve/CVE-2023-24329
https://access.redhat.com/security/cve/CVE-2023-26604
https://access.redhat.com/security/cve/CVE-2023-27535
https://access.redhat.com/security/cve/CVE-2023-38408
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/security/vulnerabilities/RHSB-2023-001
6. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=8t4D
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce