Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Cryostat
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Cryostat
ID: RHSA-2022:4985-01
Distribution: Red Hat
Plattformen: Red Hat Cryostat
Datum: Fr, 10. Juni 2022, 09:12
Referenzen: https://access.redhat.com/security/cve/CVE-2018-25032
https://access.redhat.com/security/cve/CVE-2021-4189
https://access.redhat.com/security/cve/CVE-2021-3737
https://access.redhat.com/security/cve/CVE-2022-25647
https://access.redhat.com/security/cve/CVE-2021-3634
https://access.redhat.com/security/cve/CVE-2022-28948
Applikationen: Cryostat

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Cryostat 2.1.1: new Cryostat on RHEL 8 container
images
Advisory ID: RHSA-2022:4985-01
Product: Cryostat
Advisory URL: https://access.redhat.com/errata/RHSA-2022:4985
Issue date: 2022-06-09
CVE Names: CVE-2018-25032 CVE-2021-3634 CVE-2021-3737
CVE-2021-4189 CVE-2022-25647 CVE-2022-28948
=====================================================================

1. Summary:

New Cryostat 2.1.1 on RHEL 8 container images are now available

2. Description:

New Cryostat 2.1.1 on RHEL 8 container images have been released,
containing bug fixes and addressing the following security vulnerabilities:
CVE-2022-25647, CVE-2022-28948 (see References)

Users of Cryostat 2 on RHEL 8 container images are advised to upgrade to
these updated images, which contain backported patches to correct these
security issues and fix these bugs. Users of these images are also
encouraged to rebuild all container images that depend on these images.

You can find images updated by this advisory in Red Hat Container Catalog
(see References).

3. Solution:

The Cryostat 2 on RHEL 8 container images provided by this update can be
downloaded from the Red Hat Container Registry at registry.redhat.io.
Installation instructions for your platform are available at Red Hat
Container Catalog (see References).

Dockerfiles and scripts should be amended either to refer to this new image
specifically, or to the latest image generally.

4. Bugs fixed (https://bugzilla.redhat.com/):

2080850 - CVE-2022-25647 com.google.code.gson-gson: Deserialization of
Untrusted Data in com.google.code.gson-gson
2088748 - CVE-2022-28948 golang-gopkg-yaml: crash when attempting to
deserialize invalid input

5. References:

https://access.redhat.com/security/cve/CVE-2018-25032
https://access.redhat.com/security/cve/CVE-2021-3634
https://access.redhat.com/security/cve/CVE-2021-3737
https://access.redhat.com/security/cve/CVE-2021-4189
https://access.redhat.com/security/cve/CVE-2022-25647
https://access.redhat.com/security/cve/CVE-2022-28948
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=TSuR
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung