A Red Hat Advanced Cluster Management 2.3.6 security updates and bug fixes has been released.
RHSA-2022:0595-01: Important: Red Hat Advanced Cluster Management 2.3.6 security updates and bug fixes
=====================================================================
Red Hat Security Advisory
Synopsis: Important: Red Hat Advanced Cluster Management 2.3.6 security updates and bug fixes
Advisory ID: RHSA-2022:0595-02
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2022:0595
Issue date: 2022-02-22
Updated on: 2022-03-04
CVE Names: CVE-2020-25704 CVE-2020-36322 CVE-2021-3521
CVE-2021-3712 CVE-2021-3872 CVE-2021-3918
CVE-2021-3984 CVE-2021-4019 CVE-2021-4034
CVE-2021-4122 CVE-2021-4155 CVE-2021-4192
CVE-2021-4193 CVE-2021-20321 CVE-2021-23566
CVE-2021-42574 CVE-2021-42739 CVE-2021-43565
CVE-2022-0155 CVE-2022-0185 CVE-2022-20612
CVE-2022-20617
=====================================================================
1. Summary:
Red Hat Advanced Cluster Management for Kubernetes 2.3.6 General
Availability
release images, which provide security updates and bug fixes.
Red Hat Product Security has rated this update as having a security impact
of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives
a detailed severity rating, is available for each vulnerability from the
CVE
link(s) in the References section.
2. Description:
Red Hat Advanced Cluster Management for Kubernetes 2.3.6 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.
This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which provide some security fixes and bug fixes.
See the following Release Notes documentation, which will be updated
shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/
Security updates:
* Nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)
* Nanoid: Information disclosure via valueOf() function (CVE-2021-23566)
* Golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)
* Follow-redirects: Exposure of Private Personal Information to an
Unauthorized Actor (CVE-2022-0155)
Bug fixes:
* Inform ACM policy is not checking properly the node fields (BZ# 2015588)
* ImagePullPolicy is "Always" for multicluster-operators-subscription-rhel8
image (BZ# 2021128)
* Traceback blocks reconciliation of helm repository hosted on AWS S3
storage (BZ# 2021576)
* RHACM 2.3.6 images (BZ# 2029507)
* Console UI enabled SNO UI Options not displayed during cluster creating
(BZ# 2030002)
* Grc pod restarts for each new GET request to the Governance Policy Page
(BZ# 2037351)
* Clustersets do not appear in UI (BZ# 2049810)
3. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html-single/install/index#installing
4. Bugs fixed ( https://bugzilla.redhat.com/):
2015588 - Inform ACM policy is not checking properly the node fields
2021128 - imagePullPolicy is "Always" for multicluster-operators-subscription-rhel8 image
2021576 - traceback blocks reconciliation of helm repository hosted on AWS S3 storage
2024702 - CVE-2021-3918 nodejs-json-schema: Prototype pollution vulnerability
2029507 - RHACM 2.3.6 images
2030002 - Console UI enabled SNO UI Options not displayed during cluster creating
2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic
2037351 - grc pod restarts for each new GET request to the Governance Policy Page
2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor
2049810 - Clustersets do not appear in UI
2050853 - CVE-2021-23566 nanoid: Information disclosure via valueOf() function
5. References:
https://access.redhat.com/security/cve/CVE-2020-25704
https://access.redhat.com/security/cve/CVE-2020-36322
https://access.redhat.com/security/cve/CVE-2021-3521
https://access.redhat.com/security/cve/CVE-2021-3712
https://access.redhat.com/security/cve/CVE-2021-3872
https://access.redhat.com/security/cve/CVE-2021-3918
https://access.redhat.com/security/cve/CVE-2021-3984
https://access.redhat.com/security/cve/CVE-2021-4019
https://access.redhat.com/security/cve/CVE-2021-4034
https://access.redhat.com/security/cve/CVE-2021-4122
https://access.redhat.com/security/cve/CVE-2021-4155
https://access.redhat.com/security/cve/CVE-2021-4192
https://access.redhat.com/security/cve/CVE-2021-4193
https://access.redhat.com/security/cve/CVE-2021-20321
https://access.redhat.com/security/cve/CVE-2021-23566
https://access.redhat.com/security/cve/CVE-2021-42574
https://access.redhat.com/security/cve/CVE-2021-42739
https://access.redhat.com/security/cve/CVE-2021-43565
https://access.redhat.com/security/cve/CVE-2022-0155
https://access.redhat.com/security/cve/CVE-2022-0185
https://access.redhat.com/security/cve/CVE-2022-20612
https://access.redhat.com/security/cve/CVE-2022-20617
https://access.redhat.com/security/updates/classification/#important
6. Contact:
The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc.