Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in ACS
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in ACS
ID: RHSA-2025:3929
Distribution: Red Hat
Plattformen: Red Hat RHACS 4.6 for RHEL 8
Datum: Mi, 16. April 2025, 06:36
Referenzen: https://access.redhat.com/security/cve/CVE-2024-21536
https://bugzilla.redhat.com/show_bug.cgi?id=2354195
https://access.redhat.com/security/cve/CVE-2025-30204
https://access.redhat.com/security/cve/CVE-2024-57083
https://bugzilla.redhat.com/show_bug.cgi?id=2355865
https://bugzilla.redhat.com/show_bug.cgi?id=2319884
https://access.redhat.com/errata/RHSA-2025:3929
https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_security_for_kubernetes/4.6/html/release_notes/release-notes-46
Applikationen: ACS

Originalnachricht

Updated images are now available for Red Hat Advanced Cluster Security (RHACS).

This release of RHACS fixes the following bugs:

* Fixed an issue where Central could perform image scans even when delegated
scanning was enabled, due to a race condition during Sensor reconnection.

* Fixed an issue where mismatched aggregation fields in Compliance tables and
widgets caused inconsistent percentage displays.

* Fixed an issue where you ran into Google Kubernetes Engine (GKE)
compatibility test failures because the tests still used a deprecated service in RHACS 4.6.

* Fixed an issue where you could see the Configuration Management page despite
only having Alert permissions, resulting in role-based access control (RBAC) errors.

* Fixed an issue where verifying multi-signed images failed due to incorrect
error handling.

This release of RHACS fixes the following security vulnerabilities:

CVE-2024-21536: Flaw in http-proxy-middleware allowed denial of service through
unhandled promise rejections in micromatch.

CVE-2025-30204: Flaw in jwt-go allowed excessive memory allocation during
header parsing, which could lead to a possible denial of service.

CVE-2024-57083: Flaw in redoc allowed prototypes in mergeObjects to be tainted,
which allowed a denial of service through crafted payloads.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2024-21536: Uncontrolled Resource Consumption (CWE-400)
CVE-2024-57083: Improperly Controlled Modification of Object Prototype
Attributes ('Prototype Pollution') (CWE-1321)
CVE-2025-30204: Asymmetric Resource Consumption (Amplification) (CWE-405)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung