Red Hat 9017 Published by

A Red Hat Advanced Cluster Management 2.4.6 security update and bug fixes has been released.



RHSA-2022:6696-01: Critical: Red Hat Advanced Cluster Management 2.4.6 security update and bug fixes



=====================================================================
Red Hat Security Advisory

Synopsis: Critical: Red Hat Advanced Cluster Management 2.4.6 security update and bug fixes
Advisory ID: RHSA-2022:6696-01
Product: Red Hat ACM
Advisory URL:   https://access.redhat.com/errata/RHSA-2022:6696
Issue date: 2022-09-26
CVE Names: CVE-2015-20107 CVE-2020-28915 CVE-2021-40528
CVE-2022-0391 CVE-2022-1012 CVE-2022-1292
CVE-2022-1586 CVE-2022-1729 CVE-2022-1785
CVE-2022-1897 CVE-2022-1927 CVE-2022-2068
CVE-2022-2097 CVE-2022-2526 CVE-2022-21123
CVE-2022-21125 CVE-2022-21166 CVE-2022-22576
CVE-2022-25313 CVE-2022-25314 CVE-2022-27666
CVE-2022-27774 CVE-2022-27776 CVE-2022-27782
CVE-2022-29154 CVE-2022-29824 CVE-2022-30629
CVE-2022-31129 CVE-2022-31150 CVE-2022-31151
CVE-2022-32206 CVE-2022-32208 CVE-2022-32250
CVE-2022-34903 CVE-2022-36067
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General
Availability release images, which fix bugs and update container images.

Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.4.6 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several security issues and several
bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:

  https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/

Security fixes:

* golang: crypto/tls: session tickets lack random ticket_age_add
(CVE-2022-30629)

* moment: inefficient parsing algorithim resulting in DoS (CVE-2022-31129)

* nodejs16: CRLF injection in node-undici (CVE-2022-31150)

* nodejs/undici: Cookie headers uncleared on cross-origin redirect
(CVE-2022-31151)

* vm2: Sandbox Escape in vm2 (CVE-2022-36067)

Bug fixes:

* RHACM 2.4 using deprecated APIs in managed clusters (BZ# 2041540)

* vSphere network name doesn't allow entering spaces and doesn't reflect
YAML changes (BZ# 2074766)

* cluster update status is stuck, also update is not even visible (BZ#
2079418)

* Policy that creates cluster role is showing as not compliant due to
Request entity too large message (BZ# 2088486)

* Upgraded from RHACM 2.2-->2.3-->2.4 and cannot create cluster (BZ#
2089490)

* ACM Console Becomes Unusable After a Time (BZ# 2097464)

* RHACM 2.4.6 images (BZ# 2100613)

* Cluster Pools with conflicting name of existing clusters in same
namespace fails creation and deletes existing cluster (BZ# 2102436)

* ManagedClusters in Pending import state after ACM hub migration (BZ#
2102495)

3. Solution:

For Red Hat Advanced Cluster Management for Kubernetes, see the following
documentation, which will be updated shortly for this release, for
important
instructions on installing this update:

  https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing

4. Bugs fixed (  https://bugzilla.redhat.com/):

2041540 - RHACM 2.4 using deprecated APIs in managed clusters
2074766 - vSphere network name doesn't allow entering spaces and doesn't reflect YAML changes
2079418 - cluster update status is stuck, also update is not even visible
2088486 - Policy that creates cluster role is showing as not compliant due to Request entity too large message
2089490 - Upgraded from RHACM 2.2-->2.3-->2.4 and cannot create cluster
2092793 - CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add
2097464 - ACM Console Becomes Unusable After a Time
2100613 - RHACM 2.4.6 images
2102436 - Cluster Pools with conflicting name of existing clusters in same namespace fails creation and deletes existing cluster
2102495 - ManagedClusters in Pending import state after ACM hub migration
2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS
2109354 - CVE-2022-31150 nodejs16: CRLF injection in node-undici
2121396 - CVE-2022-31151 nodejs/undici: Cookie headers uncleared on cross-origin redirect
2124794 - CVE-2022-36067 vm2: Sandbox Escape in vm2

5. References:

  https://access.redhat.com/security/cve/CVE-2015-20107
  https://access.redhat.com/security/cve/CVE-2020-28915
  https://access.redhat.com/security/cve/CVE-2021-40528
  https://access.redhat.com/security/cve/CVE-2022-0391
  https://access.redhat.com/security/cve/CVE-2022-1012
  https://access.redhat.com/security/cve/CVE-2022-1292
  https://access.redhat.com/security/cve/CVE-2022-1586
  https://access.redhat.com/security/cve/CVE-2022-1729
  https://access.redhat.com/security/cve/CVE-2022-1785
  https://access.redhat.com/security/cve/CVE-2022-1897
  https://access.redhat.com/security/cve/CVE-2022-1927
  https://access.redhat.com/security/cve/CVE-2022-2068
  https://access.redhat.com/security/cve/CVE-2022-2097
  https://access.redhat.com/security/cve/CVE-2022-2526
  https://access.redhat.com/security/cve/CVE-2022-21123
  https://access.redhat.com/security/cve/CVE-2022-21125
  https://access.redhat.com/security/cve/CVE-2022-21166
  https://access.redhat.com/security/cve/CVE-2022-22576
  https://access.redhat.com/security/cve/CVE-2022-25313
  https://access.redhat.com/security/cve/CVE-2022-25314
  https://access.redhat.com/security/cve/CVE-2022-27666
  https://access.redhat.com/security/cve/CVE-2022-27774
  https://access.redhat.com/security/cve/CVE-2022-27776
  https://access.redhat.com/security/cve/CVE-2022-27782
  https://access.redhat.com/security/cve/CVE-2022-29154
  https://access.redhat.com/security/cve/CVE-2022-29824
  https://access.redhat.com/security/cve/CVE-2022-30629
  https://access.redhat.com/security/cve/CVE-2022-31129
  https://access.redhat.com/security/cve/CVE-2022-31150
  https://access.redhat.com/security/cve/CVE-2022-31151
  https://access.redhat.com/security/cve/CVE-2022-32206
  https://access.redhat.com/security/cve/CVE-2022-32208
  https://access.redhat.com/security/cve/CVE-2022-32250
  https://access.redhat.com/security/cve/CVE-2022-34903
  https://access.redhat.com/security/cve/CVE-2022-36067
  https://access.redhat.com/security/updates/classification/#critical

6. Contact:

The Red Hat security contact is . More contact
details at   https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.