Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Red Hat Advanced Cluster Management 2.9.3
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Red Hat Advanced Cluster Management 2.9.3
ID: RHSA-2024:1328
Distribution: Red Hat
Plattformen: Red Hat Advanced Cluster Management for Kubernetes 2.9 for RHEL 8
Datum: Fr, 15. März 2024, 06:52
Referenzen: https://bugzilla.redhat.com/show_bug.cgi?id=2251198
https://bugzilla.redhat.com/show_bug.cgi?id=2265440
https://issues.redhat.com/browse/ACM-8998
https://issues.redhat.com/browse/ACM-9724
https://issues.redhat.com/browse/ACM-9311
https://issues.redhat.com/browse/ACM-9719
https://bugzilla.redhat.com/show_bug.cgi?id=2245180
https://issues.redhat.com/browse/ACM-9467
https://access.redhat.com/security/cve/CVE-2023-47108
https://issues.redhat.com/browse/ACM-8728
https://access.redhat.com/security/cve/CVE-2024-26147
https://issues.redhat.com/browse/ACM-9186
https://issues.redhat.com/browse/ACM-9123
https://issues.redhat.com/browse/ACM-9145
https://bugzilla.redhat.com/show_bug.cgi?id=2264336
https://issues.redhat.com/browse/ACM-9947
https://access.redhat.com/security/cve/CVE-2024-25620
https://access.redhat.com/security/cve/CVE-2023-45142
https://issues.redhat.com/browse/ACM-9746
https://issues.redhat.com/browse/ACM-9885
https://issues.redhat.com/browse/ACM-9930
https://access.redhat.com/errata/RHSA-2024:1328
Applikationen: Red Hat Advanced Cluster Management 2.9.3

Originalnachricht

Red Hat Advanced Cluster Management for Kubernetes 2.9.3 General
Availability release images, which fix bugs and update container images.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

Red Hat Advanced Cluster Management for Kubernetes 2.9.3 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.9/html/release_notes/

Security fix(es):
CVE-2023-45142 opentelemetry: DoS vulnerability in otelhttp
CVE-2023-47108 opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to
unbound cardinality metrics
CVE-2024-25620 helm: Dependency management path traversal
CVE-2024-26147 helm: Missing YAML Content Leads To Panic

Jira issues addressed:

* ACM-8728: Machine Pool scaling doesn't work for Openstack cluster
* ACM-8998: Dependency on ConstraintTemplate stuck in Pending state
* ACM-9123: Trying to upgrade a managed cluster fails with user forbidden
errors
* ACM-9145: Unable to upgrade managed cluster from ACM
* ACM-9186: search-postgres persists in CrashLoopBackOff while being included
in the ACM CR with hugepages enabled
* ACM-9311: hcp hypershift operator doesn't support OCP 4.15
* ACM-9467: [Doc bug] Update adding day2 master to unhealthy cluster procedure
doc
* ACM-9719: log error message when the restore cannot be created
* ACM-9724: Console Search page flickering on initial loading
* ACM-9746: Search collector logging excessively
* ACM-9885: Console initial loading time increases over time [ACM 2.9.z]
* ACM-9930: A misconfigured PlacementBinding halts root Policy updates
* ACM-9947: The ACM topology view does not show the correct status when the
subscription namespace differs from the resource namespace.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2023-45142: Allocation of Resources Without Limits or Throttling (CWE-770)
CVE-2023-47108: Allocation of Resources Without Limits or Throttling (CWE-770)
CVE-2024-25620: Improper Limitation of a Pathname to a Restricted Directory
('Path Traversal') (CWE-22)
CVE-2024-26147: Use of Uninitialized Variable (CWE-457)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung