Red Hat 9037 Published by

A Red Hat Advanced Cluster Management for Kubernetes version 2.3 has been released.



RHSA-2021:3016-01: Important: Red Hat Advanced Cluster Management for Kubernetes version 2.3



=====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat Advanced Cluster Management for Kubernetes version 2.3
Advisory ID: RHSA-2021:3016-01
Product: Red Hat ACM
Advisory URL:   https://access.redhat.com/errata/RHSA-2021:3016
Issue date: 2021-08-05
CVE Names: CVE-2016-10228 CVE-2017-14502 CVE-2018-20843
CVE-2018-1000858 CVE-2019-2708 CVE-2019-9169
CVE-2019-13050 CVE-2019-13627 CVE-2019-14889
CVE-2019-15903 CVE-2019-19906 CVE-2019-20454
CVE-2019-20934 CVE-2019-25013 CVE-2020-1730
CVE-2020-8231 CVE-2020-8284 CVE-2020-8285
CVE-2020-8286 CVE-2020-8927 CVE-2020-11668
CVE-2020-13434 CVE-2020-15358 CVE-2020-27618
CVE-2020-28196 CVE-2020-28469 CVE-2020-28500
CVE-2020-28851 CVE-2020-28852 CVE-2020-29361
CVE-2020-29362 CVE-2020-29363 CVE-2021-3326
CVE-2021-3377 CVE-2021-3449 CVE-2021-3450
CVE-2021-3516 CVE-2021-3517 CVE-2021-3518
CVE-2021-3520 CVE-2021-3537 CVE-2021-3541
CVE-2021-3560 CVE-2021-20271 CVE-2021-20305
CVE-2021-21272 CVE-2021-21309 CVE-2021-21321
CVE-2021-21322 CVE-2021-23337 CVE-2021-23343
CVE-2021-23346 CVE-2021-23362 CVE-2021-23364
CVE-2021-23368 CVE-2021-23369 CVE-2021-23382
CVE-2021-23383 CVE-2021-23839 CVE-2021-23840
CVE-2021-23841 CVE-2021-25217 CVE-2021-27219
CVE-2021-27292 CVE-2021-27358 CVE-2021-28092
CVE-2021-28918 CVE-2021-29418 CVE-2021-29477
CVE-2021-29478 CVE-2021-29482 CVE-2021-32399
CVE-2021-33033 CVE-2021-33034 CVE-2021-33502
CVE-2021-33623 CVE-2021-33909 CVE-2021-33910
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.3.0 General
Availability release images, which fix several bugs and security issues.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.3.0 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs and security issues. See
the following Release Notes documentation, which will be updated shortly
for this release, for additional details about this release:

  https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.3/html/release_notes/

Security:

* fastify-reply-from: crafted URL allows prefix scape of the proxied
backend service (CVE-2021-21321)

* fastify-http-proxy: crafted URL allows prefix scape of the proxied
backend service (CVE-2021-21322)

* nodejs-netmask: improper input validation of octal input data
(CVE-2021-28918)

* redis: Integer overflow via STRALGO LCS command (CVE-2021-29477)

* redis: Integer overflow via COPY command for large intsets
(CVE-2021-29478)

* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)

* nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
(CVE-2020-28500)

* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing
- -u- extension (CVE-2020-28851)

* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing
bcp47 tag (CVE-2020-28852)

* nodejs-ansi_up: XSS due to insufficient URL sanitization (CVE-2021-3377)

* oras: zip-slip vulnerability via oras-pull (CVE-2021-21272)

* redis: integer overflow when configurable limit for maximum supported
bulk input size is too big on 32-bit platforms (CVE-2021-21309)

* nodejs-lodash: command injection via template (CVE-2021-23337)

* nodejs-hosted-git-info: Regular Expression denial of service via
shortcutMatch in fromUrl() (CVE-2021-23362)

* browserslist: parsing of invalid queries could result in Regular
Expression Denial of Service (ReDoS) (CVE-2021-23364)

* nodejs-postcss: Regular expression denial of service during source map
parsing (CVE-2021-23368)

* nodejs-handlebars: Remote code execution when compiling untrusted compile
templates with strict:true option (CVE-2021-23369)

* nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in
lib/previous-map.js (CVE-2021-23382)

* nodejs-handlebars: Remote code execution when compiling untrusted compile
templates with compat:true option (CVE-2021-23383)

* openssl: integer overflow in CipherUpdate (CVE-2021-23840)

* openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
(CVE-2021-23841)

* nodejs-ua-parser-js: ReDoS via malicious User-Agent header
(CVE-2021-27292)

* grafana: snapshot feature allow an unauthenticated remote attacker to
trigger a DoS via a remote API call (CVE-2021-27358)

* nodejs-is-svg: ReDoS via malicious string (CVE-2021-28092)

* nodejs-netmask: incorrectly parses an IP address that has octal integer
with invalid character (CVE-2021-29418)

* ulikunitz/xz: Infinite loop in readUvarint allows for denial of service
(CVE-2021-29482)

* normalize-url: ReDoS for data URLs (CVE-2021-33502)

* nodejs-trim-newlines: ReDoS in .end() method (CVE-2021-33623)

* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe
(CVE-2021-23343)

* html-parse-stringify: Regular Expression DoS (CVE-2021-23346)

* openssl: incorrect SSLv2 rollback protection (CVE-2021-23839)

For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
pages listed in the References section.

Bugs:

* RFE Make the source code for the endpoint-metrics-operator public (BZ#
1913444)

* cluster became offline after apiserver health check (BZ# 1942589)

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

  https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.3/html-single/install/index#installing

4. Bugs fixed (  https://bugzilla.redhat.com/):

1913333 - CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension
1913338 - CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag
1913444 - RFE Make the source code for the endpoint-metrics-operator public
1921286 - CVE-2021-21272 oras: zip-slip vulnerability via oras-pull
1927520 - RHACM 2.3.0 images
1928937 - CVE-2021-23337 nodejs-lodash: command injection via template
1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
1930294 - CVE-2021-23839 openssl: incorrect SSLv2 rollback protection
1930310 - CVE-2021-23841 openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
1930324 - CVE-2021-23840 openssl: integer overflow in CipherUpdate
1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms
1936427 - CVE-2021-3377 nodejs-ansi_up: XSS due to insufficient URL sanitization
1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string
1940196 - View Resource YAML option shows 404 error when reviewing a Subscription for an application
1940613 - CVE-2021-27292 nodejs-ua-parser-js: ReDoS via malicious User-Agent header
1941024 - CVE-2021-27358 grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call
1941675 - CVE-2021-23346 html-parse-stringify: Regular Expression DoS
1942178 - CVE-2021-21321 fastify-reply-from: crafted URL allows prefix scape of the proxied backend service
1942182 - CVE-2021-21322 fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service
1942589 - cluster became offline after apiserver health check
1943208 - CVE-2021-23362 nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()
1944822 - CVE-2021-29418 nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character
1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data
1945459 - CVE-2020-28469 nodejs-glob-parent: Regular expression denial of service
1948761 - CVE-2021-23369 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option
1948763 - CVE-2021-23368 nodejs-postcss: Regular expression denial of service during source map parsing
1954150 - CVE-2021-23382 nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js
1954368 - CVE-2021-29482 ulikunitz/xz: Infinite loop in readUvarint allows for denial of service
1955619 - CVE-2021-23364 browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS)
1956688 - CVE-2021-23383 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option
1956818 - CVE-2021-23343 nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe
1957410 - CVE-2021-29477 redis: Integer overflow via STRALGO LCS command
1957414 - CVE-2021-29478 redis: Integer overflow via COPY command for large intsets
1964461 - CVE-2021-33502 normalize-url: ReDoS for data URLs
1966615 - CVE-2021-33623 nodejs-trim-newlines: ReDoS in .end() method
1968122 - clusterdeployment fails because hiveadmission sc does not have correct permissions
1972703 - Subctl fails to join cluster, since it cannot auto-generate a valid cluster id
1983131 - Defragmenting an etcd member doesn't reduce the DB size (7.5GB) on a setup with ~1000 spoke clusters

5. References:

  https://access.redhat.com/security/cve/CVE-2016-10228
  https://access.redhat.com/security/cve/CVE-2017-14502
  https://access.redhat.com/security/cve/CVE-2018-20843
  https://access.redhat.com/security/cve/CVE-2018-1000858
  https://access.redhat.com/security/cve/CVE-2019-2708
  https://access.redhat.com/security/cve/CVE-2019-9169
  https://access.redhat.com/security/cve/CVE-2019-13050
  https://access.redhat.com/security/cve/CVE-2019-13627
  https://access.redhat.com/security/cve/CVE-2019-14889
  https://access.redhat.com/security/cve/CVE-2019-15903
  https://access.redhat.com/security/cve/CVE-2019-19906
  https://access.redhat.com/security/cve/CVE-2019-20454
  https://access.redhat.com/security/cve/CVE-2019-20934
  https://access.redhat.com/security/cve/CVE-2019-25013
  https://access.redhat.com/security/cve/CVE-2020-1730
  https://access.redhat.com/security/cve/CVE-2020-8231
  https://access.redhat.com/security/cve/CVE-2020-8284
  https://access.redhat.com/security/cve/CVE-2020-8285
  https://access.redhat.com/security/cve/CVE-2020-8286
  https://access.redhat.com/security/cve/CVE-2020-8927
  https://access.redhat.com/security/cve/CVE-2020-11668
  https://access.redhat.com/security/cve/CVE-2020-13434
  https://access.redhat.com/security/cve/CVE-2020-15358
  https://access.redhat.com/security/cve/CVE-2020-27618
  https://access.redhat.com/security/cve/CVE-2020-28196
  https://access.redhat.com/security/cve/CVE-2020-28469
  https://access.redhat.com/security/cve/CVE-2020-28500
  https://access.redhat.com/security/cve/CVE-2020-28851
  https://access.redhat.com/security/cve/CVE-2020-28852
  https://access.redhat.com/security/cve/CVE-2020-29361
  https://access.redhat.com/security/cve/CVE-2020-29362
  https://access.redhat.com/security/cve/CVE-2020-29363
  https://access.redhat.com/security/cve/CVE-2021-3326
  https://access.redhat.com/security/cve/CVE-2021-3377
  https://access.redhat.com/security/cve/CVE-2021-3449
  https://access.redhat.com/security/cve/CVE-2021-3450
  https://access.redhat.com/security/cve/CVE-2021-3516
  https://access.redhat.com/security/cve/CVE-2021-3517
  https://access.redhat.com/security/cve/CVE-2021-3518
  https://access.redhat.com/security/cve/CVE-2021-3520
  https://access.redhat.com/security/cve/CVE-2021-3537
  https://access.redhat.com/security/cve/CVE-2021-3541
  https://access.redhat.com/security/cve/CVE-2021-3560
  https://access.redhat.com/security/cve/CVE-2021-20271
  https://access.redhat.com/security/cve/CVE-2021-20305
  https://access.redhat.com/security/cve/CVE-2021-21272
  https://access.redhat.com/security/cve/CVE-2021-21309
  https://access.redhat.com/security/cve/CVE-2021-21321
  https://access.redhat.com/security/cve/CVE-2021-21322
  https://access.redhat.com/security/cve/CVE-2021-23337
  https://access.redhat.com/security/cve/CVE-2021-23343
  https://access.redhat.com/security/cve/CVE-2021-23346
  https://access.redhat.com/security/cve/CVE-2021-23362
  https://access.redhat.com/security/cve/CVE-2021-23364
  https://access.redhat.com/security/cve/CVE-2021-23368
  https://access.redhat.com/security/cve/CVE-2021-23369
  https://access.redhat.com/security/cve/CVE-2021-23382
  https://access.redhat.com/security/cve/CVE-2021-23383
  https://access.redhat.com/security/cve/CVE-2021-23839
  https://access.redhat.com/security/cve/CVE-2021-23840
  https://access.redhat.com/security/cve/CVE-2021-23841
  https://access.redhat.com/security/cve/CVE-2021-25217
  https://access.redhat.com/security/cve/CVE-2021-27219
  https://access.redhat.com/security/cve/CVE-2021-27292
  https://access.redhat.com/security/cve/CVE-2021-27358
  https://access.redhat.com/security/cve/CVE-2021-28092
  https://access.redhat.com/security/cve/CVE-2021-28918
  https://access.redhat.com/security/cve/CVE-2021-29418
  https://access.redhat.com/security/cve/CVE-2021-29477
  https://access.redhat.com/security/cve/CVE-2021-29478
  https://access.redhat.com/security/cve/CVE-2021-29482
  https://access.redhat.com/security/cve/CVE-2021-32399
  https://access.redhat.com/security/cve/CVE-2021-33033
  https://access.redhat.com/security/cve/CVE-2021-33034
  https://access.redhat.com/security/cve/CVE-2021-33502
  https://access.redhat.com/security/cve/CVE-2021-33623
  https://access.redhat.com/security/cve/CVE-2021-33909
  https://access.redhat.com/security/cve/CVE-2021-33910
  https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is . More contact
details at   https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.