First published: Thu Jun 29 2023(Updated: )
The release of ACS 4.1 provides these changes:<br>Security Fix(es):<br><li> golang: crash in a golang.org/x/crypto/ssh server (CVE-2022-27191)</li> <li> net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)</li> <li> golang: net/http, net/textproto: denial of service from excessive memory allocation (CVE-2023-24534)</li> <li> golang: net/http, net/textproto, mime/multipart: denial of service from excessive resource consumption (CVE-2023-24536)</li> <li> golang: go/parser: Infinite loop in parsing (CVE-2023-24537)</li> <li> golang: html/template: backticks not treated as string delimiters (CVE-2023-24538)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.<br>New features:<br><li> Manual renewal of Central and Sensor certificates</li> <li> Vulnerability Management 2.0 (Technology Preview)</li> <li> RHACS Cloud Service scanning support for images pulled from on-premise registries</li> <li> eBPF collection method on IBM Z and IBM® LinuxONE</li> <li> Ability to configure the display of default compliance standards in the Compliance Dashboard</li> <li> Declarative configurations for authentication and authorization</li> <li> SSO configuration using the roxctl CLI</li> <li> New collection method based on BPF CO-RE (Technology Preview)</li> <li> Network graph updates</li> <li> Policy Management simplification</li> <li> New permission sets</li> <li> Improvements for Sensor resync (General Availability)</li> For notable technical changes, deprecated and removed features, bug fixes, and known issues, refer to the Release Notes.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.