-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: VolSync 0.6.3 security fixes and enhancements Advisory ID: RHSA-2023:4576-01 Product: Red Hat ACM Advisory URL: https://access.redhat.com/errata/RHSA-2023:4576 Issue date: 2023-08-08 CVE Names: CVE-2020-24736 CVE-2022-35252 CVE-2022-36227 CVE-2022-43552 CVE-2023-0361 CVE-2023-1667 CVE-2023-2283 CVE-2023-3089 CVE-2023-24329 CVE-2023-26604 CVE-2023-27535 CVE-2023-38408 ===================================================================== 1. Summary: VolSync v0.6.3 security fixes and enhancements Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section. 2. Description: VolSync is a Kubernetes operator that enables asynchronous replication of persistent volumes within a cluster, or across clusters. After deploying the VolSync operator, it can create and maintain copies of your persistent data. For more information about VolSync, see: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/add-ons/add-ons-overview#volsync or the VolSync open source community website at: https://volsync.readthedocs.io/en/stable/. This advisory contains enhancements and updates to the VolSync container images. Security fix(es): * CVE-2023-3089 openshift: OCP & FIPS mode 3. Solution: For details on how to install VolSync, refer to: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.7/html/add-ons/add-ons-overview#volsync-rep 4. Bugs fixed (https://bugzilla.redhat.com/): 2212085 - CVE-2023-3089 openshift: OCP & FIPS mode 5. References: https://access.redhat.com/security/cve/CVE-2020-24736 https://access.redhat.com/security/cve/CVE-2022-35252 https://access.redhat.com/security/cve/CVE-2022-36227 https://access.redhat.com/security/cve/CVE-2022-43552 https://access.redhat.com/security/cve/CVE-2023-0361 https://access.redhat.com/security/cve/CVE-2023-1667 https://access.redhat.com/security/cve/CVE-2023-2283 https://access.redhat.com/security/cve/CVE-2023-3089 https://access.redhat.com/security/cve/CVE-2023-24329 https://access.redhat.com/security/cve/CVE-2023-26604 https://access.redhat.com/security/cve/CVE-2023-27535 https://access.redhat.com/security/cve/CVE-2023-38408 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/security/vulnerabilities/RHSB-2023-001 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJk0qNmAAoJENzjgjWX9erE0XEQAIGkOtzF36HLk9zsNN5ViO05 pDEBBDxN3Q/V9eRKMxy+lNlUgk3jjc4SqxZlnJtCU13Vr+CUbZcikWLmwSTXh7gb ATEyBur+2i2GCPi/CQzZIe37rGO0xl6swaMFhTa8U0/q1rzQRSr73xfuxyEhL96j V1kMxK7WLvezcnkbo9eyw4V7vZVOqGXJEARTUGn5MyivnwoMDLiGLKJV/quXdPve zQFWuccegjdgNjzwGYxTe0aJnAXHOf19c4OD8KZ+GE+2QBlV1D68/D9+mljWSheO gP/IsqnuWGcZkngIU/nYhoBitGWgY13PRKNDiAGfF5ro1cgHeT/fGZ7tyWmYC/lq JM0jBTLh+LA1L+nFuBKArzfVaSviGXcz2+LR0aBIZfRvB4mqDP+mUnW3r1HF9Aa3 3kHcgpdsHA5NT4FwCDKmiAw7C9QRdow2qiyOuInhMt+iGfC02j1ohAXgt4sW68gb P6QSR4/olTtJXmOuZwuRWXwDHxBxUrS4XEVwFqZ+TOM+a9Q9y3Wb8+09Kl9lv0RT z4oFmL3W5+9pC8AAqbYkyy66dWNjWYu4GHAGOpRA9K6B5maF4F8cijIuf4sTlmx2 vhlJD8vGuyViI/Rwt9klaXTX2on4LBg/jBqWiwHdCwNpdPjBUWRNRNAsF4S+0BZN Kyoemtm32fm6VGubKbdW =8t4D -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce