A Red Hat Advanced Cluster Management 2.4.5 security updates and bug fixes has been released.
RHSA-2022:5201-01: Moderate: Red Hat Advanced Cluster Management 2.4.5 security updates and bug fixes
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Red Hat Advanced Cluster Management 2.4.5 security updates and bug fixes
Advisory ID: RHSA-2022:5201-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2022:5201
Issue date: 2022-06-27
CVE Names: CVE-2018-25032 CVE-2020-0404 CVE-2020-4788
CVE-2020-13974 CVE-2020-19131 CVE-2020-27820
CVE-2021-0941 CVE-2021-3612 CVE-2021-3634
CVE-2021-3669 CVE-2021-3695 CVE-2021-3696
CVE-2021-3697 CVE-2021-3737 CVE-2021-3743
CVE-2021-3744 CVE-2021-3752 CVE-2021-3759
CVE-2021-3764 CVE-2021-3772 CVE-2021-3773
CVE-2021-4002 CVE-2021-4037 CVE-2021-4083
CVE-2021-4157 CVE-2021-4189 CVE-2021-4197
CVE-2021-4203 CVE-2021-20322 CVE-2021-21781
CVE-2021-25219 CVE-2021-26401 CVE-2021-29154
CVE-2021-37159 CVE-2021-38185 CVE-2021-41617
CVE-2021-41864 CVE-2021-42739 CVE-2021-43056
CVE-2021-43389 CVE-2021-43565 CVE-2021-43976
CVE-2021-44733 CVE-2021-45485 CVE-2021-45486
CVE-2022-0001 CVE-2022-0002 CVE-2022-0286
CVE-2022-0322 CVE-2022-1011 CVE-2022-1271
CVE-2022-21803 CVE-2022-23806 CVE-2022-24450
CVE-2022-24785 CVE-2022-25645 CVE-2022-28733
CVE-2022-28734 CVE-2022-28735 CVE-2022-28736
CVE-2022-28737 CVE-2022-29526 CVE-2022-29810
=====================================================================
1. Summary:
Red Hat Advanced Cluster Management for Kubernetes 2.4.5 General
Availability release images, which fix bugs and update container images.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which
gives a detailed severity rating, is available for each vulnerability from
the CVE links in the References section.
2. Description:
Red Hat Advanced Cluster Management for Kubernetes 2.4.5 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which apply security fixes and fix several bugs.
See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/
Security fixes:
* golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)
* nconf: Prototype pollution in memory store (CVE-2022-21803)
* golang: crypto/elliptic IsOnCurve returns true for invalid field elements
(CVE-2022-23806)
* nats-server: misusing the "dynamically provisioned sandbox accounts"
feature authenticated user can obtain the privileges of the System account
(CVE-2022-24450)
* Moment.js: Path traversal in moment.locale (CVE-2022-24785)
* dset: Prototype Pollution in dset (CVE-2022-25645)
* golang: syscall: faccessat checks wrong group (CVE-2022-29526)
* go-getter: writes SSH credentials into logfile, exposing sensitive
credentials to local uses (CVE-2022-29810)
Bug fixes:
* Trying to create a new cluster on vSphere and no feedback, stuck in
"creating" (BZ# 1937078)
* Wrong message is displayed when GRC fails to connect to an Ansible Tower
(BZ# 2051752)
* multicluster_operators_hub_subscription issues due to /tmp usage (BZ#
2052702)
* Create Cluster, Worker Pool 2 zones do not load options that relate to
the selected Region field (BZ# 2054954)
* Changing the multiclusterhub name other than the default name keeps the
version in the web console loading (BZ# 2059822)
* search-redisgraph-0 generating massive amount of logs after 2.4.2 upgrade
(BZ# 2065318)
* Uninstall pod crashed when destroying Azure Gov cluster in ACM (BZ#
2073562)
* Deprovisioned clusters not filtered out by discovery controller (BZ#
2075594)
* When deleting a secret for a Helm application, duplicate errors show up
in topology (BZ# 2075675)
* Changing existing placement rules does not change YAML file Regression
(BZ# 2075724)
* Editing Helm Argo Applications does not Prune Old Resources (BZ# 2079906)
* Failed to delete the requested resource [404] error appears after
subscription is deleted and its placement rule is used in the second
subscription (BZ# 2080713)
* Typo in the logs when Deployable is updated in the subscription namespace
(BZ# 2080960)
* After Argo App Sets are created in an Upgraded Environment, the Clusters
column does not indicate the clusters (BZ# 2080716)
* RHACM 2.4.5 images (BZ# 2081438)
* Performance issue to get secret in claim-controller (BZ# 2081908)
* Failed to provision openshift 4.10 on bare metal (BZ# 2094109)
3. Solution:
For Red Hat Advanced Cluster Management for Kubernetes, see the following
documentation, which will be updated shortly for this release, for
important
instructions on installing this update:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing
4. Bugs fixed ( https://bugzilla.redhat.com/):
1937078 - Trying to create a new cluster on vSphere and no feedback, stuck in "creating"
2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic
2051752 - Wrong message is displayed when GRC fails to connect to an ansible tower
2052573 - CVE-2022-24450 nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account
2052702 - multicluster_operators_hub_subscription issues due to /tmp usage
2053429 - CVE-2022-23806 golang: crypto/elliptic IsOnCurve returns true for invalid field elements
2054954 - Create Cluster, Worker Pool 2 zones do not load options that relate to the selected Region field
2059822 - Changing the multiclusterhub name other than the default name keeps the version in the web console loading.
2065318 - search-redisgraph-0 generating massive amount of logs after 2.4.2 upgrade
2072009 - CVE-2022-24785 Moment.js: Path traversal in moment.locale
2073562 - Uninstall pod crashed when destroying Azure Gov cluster in ACM
2074689 - CVE-2022-21803 nconf: Prototype pollution in memory store
2075594 - Deprovisioned clusters not filtered out by discovery controller
2075675 - When deleting a secret for a Helm application, duplicate errors show up in topology
2075724 - Changing existing placement rules does not change YAML file
2079906 - Editing Helm Argo Applications does not Prune Old Resources
2080279 - CVE-2022-29810 go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses
2080713 - Failed to delete the requested resource [404] error appears after subscription is deleted and it's placement rule is used in the second subscription [Upgrade]
2080716 - After Argo App Sets are created in an Upgraded Environment, the Clusters column does not indicate the clusters
2080847 - CVE-2022-25645 dset: Prototype Pollution in dset
2080960 - Typo in the logs when Deployable is updated in the subscription namespace
2081438 - RHACM 2.4.5 images
2081908 - Performance issue to get secret in claim-controller
2084085 - CVE-2022-29526 golang: syscall: faccessat checks wrong group
2094109 - Failed to provision openshift 4.10 on bare metal
5. References:
https://access.redhat.com/security/cve/CVE-2018-25032
https://access.redhat.com/security/cve/CVE-2020-0404
https://access.redhat.com/security/cve/CVE-2020-4788
https://access.redhat.com/security/cve/CVE-2020-13974
https://access.redhat.com/security/cve/CVE-2020-19131
https://access.redhat.com/security/cve/CVE-2020-27820
https://access.redhat.com/security/cve/CVE-2021-0941
https://access.redhat.com/security/cve/CVE-2021-3612
https://access.redhat.com/security/cve/CVE-2021-3634
https://access.redhat.com/security/cve/CVE-2021-3669
https://access.redhat.com/security/cve/CVE-2021-3695
https://access.redhat.com/security/cve/CVE-2021-3696
https://access.redhat.com/security/cve/CVE-2021-3697
https://access.redhat.com/security/cve/CVE-2021-3737
https://access.redhat.com/security/cve/CVE-2021-3743
https://access.redhat.com/security/cve/CVE-2021-3744
https://access.redhat.com/security/cve/CVE-2021-3752
https://access.redhat.com/security/cve/CVE-2021-3759
https://access.redhat.com/security/cve/CVE-2021-3764
https://access.redhat.com/security/cve/CVE-2021-3772
https://access.redhat.com/security/cve/CVE-2021-3773
https://access.redhat.com/security/cve/CVE-2021-4002
https://access.redhat.com/security/cve/CVE-2021-4037
https://access.redhat.com/security/cve/CVE-2021-4083
https://access.redhat.com/security/cve/CVE-2021-4157
https://access.redhat.com/security/cve/CVE-2021-4189
https://access.redhat.com/security/cve/CVE-2021-4197
https://access.redhat.com/security/cve/CVE-2021-4203
https://access.redhat.com/security/cve/CVE-2021-20322
https://access.redhat.com/security/cve/CVE-2021-21781
https://access.redhat.com/security/cve/CVE-2021-25219
https://access.redhat.com/security/cve/CVE-2021-26401
https://access.redhat.com/security/cve/CVE-2021-29154
https://access.redhat.com/security/cve/CVE-2021-37159
https://access.redhat.com/security/cve/CVE-2021-38185
https://access.redhat.com/security/cve/CVE-2021-41617
https://access.redhat.com/security/cve/CVE-2021-41864
https://access.redhat.com/security/cve/CVE-2021-42739
https://access.redhat.com/security/cve/CVE-2021-43056
https://access.redhat.com/security/cve/CVE-2021-43389
https://access.redhat.com/security/cve/CVE-2021-43565
https://access.redhat.com/security/cve/CVE-2021-43976
https://access.redhat.com/security/cve/CVE-2021-44733
https://access.redhat.com/security/cve/CVE-2021-45485
https://access.redhat.com/security/cve/CVE-2021-45486
https://access.redhat.com/security/cve/CVE-2022-0001
https://access.redhat.com/security/cve/CVE-2022-0002
https://access.redhat.com/security/cve/CVE-2022-0286
https://access.redhat.com/security/cve/CVE-2022-0322
https://access.redhat.com/security/cve/CVE-2022-1011
https://access.redhat.com/security/cve/CVE-2022-1271
https://access.redhat.com/security/cve/CVE-2022-21803
https://access.redhat.com/security/cve/CVE-2022-23806
https://access.redhat.com/security/cve/CVE-2022-24450
https://access.redhat.com/security/cve/CVE-2022-24785
https://access.redhat.com/security/cve/CVE-2022-25645
https://access.redhat.com/security/cve/CVE-2022-28733
https://access.redhat.com/security/cve/CVE-2022-28734
https://access.redhat.com/security/cve/CVE-2022-28735
https://access.redhat.com/security/cve/CVE-2022-28736
https://access.redhat.com/security/cve/CVE-2022-28737
https://access.redhat.com/security/cve/CVE-2022-29526
https://access.redhat.com/security/cve/CVE-2022-29810
https://access.redhat.com/security/updates/classification/#moderate
6. Contact:
The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc.