- Issued:
- 2025-02-11
- Updated:
- 2025-02-11
RHSA-2025:1334 - Important: ACS 4.5 enhancement and security update
Synopsis
Important: ACS 4.5 enhancement and security update
Type/Severity
Security Advisory Important
Topic
Updated images are now available for Red Hat Advanced Cluster Security (RHACS). The updated image includes security fixes.
Description
This release of RHACS includes fixes for the following security vulnerabilities:
-
npm-serialize-javascript: Cross-site Scripting (XSS) in serialize-javascript (CVE-2024-11831)
-
go-git: Argument injection via the URL field (CVE-2025-21613)
-
go-git: Go-git clients vulnerable to DoS via maliciously crafted Git server replies (CVE-2025-21614)
-
golang.org/x/crypto: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto (CVE-2024-45337)
-
golang.org/x/net/html: Non-linear parsing of case-insensitive content in golang.org/x/net/html (CVE-2024-45338)
Solution
If you are using an earlier version of RHACS 4.5, you are advised to upgrade to this patch release 4.5.6.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Advanced Cluster Security for Kubernetes | 4 | x86_64 |
| Red Hat Advanced Cluster Security for Kubernetes for IBM Z and LinuxONE | 4 | s390x |
| Red Hat Advanced Cluster Security for Kubernetes for IBM Power, little endian | 4 | ppc64le |
Fixes
- This content is not included.BZ - 2312579
- This content is not included.BZ - 2331720
- This content is not included.BZ - 2333122
- This content is not included.BZ - 2335888
- This content is not included.BZ - 2335901
- This content is not included.ROX-27932
CVEs
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.