The following advisory data is extracted from: https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3928.json Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment. - Packet Storm Staff ==================================================================== Red Hat Security Advisory Synopsis: Important: ACS 4.5 enhancement and security update Advisory ID: RHSA-2025:3928-03 Product: Red Hat Advanced Cluster Security for Kubernetes Advisory URL: https://access.redhat.com/errata/RHSA-2025:3928 Issue date: 2025-04-16 Revision: 03 CVE Names: CVE-2024-21536 ==================================================================== Summary: Updated images are now available for Red Hat Advanced Cluster Security (RHACS). Description: This release of RHACS includes the following bug fix: * Fixed a bug to match the aggregation field of the compliance tables to the widgets for consistency. This release also addresses the following security vulnerabilities: * RHSA-2025:2679: libxml2 security update * RHSA-2025:1350: libxml2 security update * RHSA-2025:1330: openssl security update * CVE-2024-57083: Prototype pollution in redoc can allow a DoS attack * CVE-2024-21536: Flaw in `http-proxy-middleware` package * CVE-2025-30204: Flaw in the golang-jwt implementation of JSON Web Tokens (JWT) Solution: CVEs: CVE-2024-21536 References: https://access.redhat.com/security/updates/classification/#important https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_security_for_kubernetes/4.5/html/release_notes/index https://bugzilla.redhat.com/show_bug.cgi?id=2319884 https://bugzilla.redhat.com/show_bug.cgi?id=2354195 https://bugzilla.redhat.com/show_bug.cgi?id=2355865