[RHSA-2022:5188-01] Important: RHACS 3.69 security update

Security announcements for all Red Hat products and services. rhsa-announce at redhat.com
Sat Jun 25 00:35:16 UTC 2022


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: RHACS 3.69 security update
Advisory ID:       RHSA-2022:5188-01
Product:           RHACS
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:5188
Issue date:        2022-06-24
CVE Names:         CVE-2018-25032 CVE-2021-3634 CVE-2021-3672 
                   CVE-2021-3737 CVE-2021-4189 CVE-2021-23222 
                   CVE-2021-25219 CVE-2022-1154 CVE-2022-1271 
                   CVE-2022-1902 
=====================================================================

1. Summary:

Updated images are now available for Red Hat Advanced Cluster Security for
Kubernetes (RHACS). The updated image includes bug and security fixes.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Release of RHACS 3.69.2

Security Fix(es):

* stackrox: Improper sanitization allows users to retrieve Notifier secrets
from GraphQL API in plaintext (CVE-2022-1902)

3. Solution:

If you are using the RHACS 3.69.1, you are advised to upgrade to patch
release 3.69.2.

4. Bugs fixed (https://bugzilla.redhat.com/):

2090957 - CVE-2022-1902 stackrox: Improper sanitization allows users to retrieve Notifier secrets from GraphQL API in plaintext

5. JIRA issues fixed (https://issues.jboss.org/):

ROX-11455 - Release RHACS 3.69.1
ROX-9657 - Patch supported RHACS images previous to 3.69.0 release to fix RHSA-2022:0658

6. References:

https://access.redhat.com/security/cve/CVE-2018-25032
https://access.redhat.com/security/cve/CVE-2021-3634
https://access.redhat.com/security/cve/CVE-2021-3672
https://access.redhat.com/security/cve/CVE-2021-3737
https://access.redhat.com/security/cve/CVE-2021-4189
https://access.redhat.com/security/cve/CVE-2021-23222
https://access.redhat.com/security/cve/CVE-2021-25219
https://access.redhat.com/security/cve/CVE-2022-1154
https://access.redhat.com/security/cve/CVE-2022-1271
https://access.redhat.com/security/cve/CVE-2022-1902
https://access.redhat.com/security/updates/classification/#important

7. Contact:

The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Dg4w
-----END PGP SIGNATURE-----


More information about the RHSA-announce mailing list