Red Hat 9041 Published by

A Red Hat Advanced Cluster Management 2.6.2 security update and bug fixes has been released.



RHSA-2022:7313-01: Moderate: Red Hat Advanced Cluster Management 2.6.2 security update and bug fixes



=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat Advanced Cluster Management 2.6.2 security update and bug fixes
Advisory ID: RHSA-2022:7313-01
Product: Red Hat ACM
Advisory URL:   https://access.redhat.com/errata/RHSA-2022:7313
Issue date: 2022-11-02
CVE Names: CVE-2015-20107 CVE-2020-35525 CVE-2020-35527
CVE-2022-0391 CVE-2022-0494 CVE-2022-1353
CVE-2022-2238 CVE-2022-2509 CVE-2022-2588
CVE-2022-3515 CVE-2022-23816 CVE-2022-23825
CVE-2022-25858 CVE-2022-25887 CVE-2022-25896
CVE-2022-29900 CVE-2022-29901 CVE-2022-31129
CVE-2022-34903 CVE-2022-37434 CVE-2022-40674
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.6.2 General
Availability release images, which fix bugs and update container images.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.6.2 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:

  https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/release_notes/

Security fixes:

* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)

* passport: incorrect session regeneration (CVE-2022-25896)

* sanitize-html: insecure global regular expression replacement logic may
lead to ReDoS (CVE-2022-25887)

* terser: insecure use of regular expressions leads to ReDoS
(CVE-2022-25858)

* search-api: SQL injection leads to remote denial of service
(CVE-2022-2238)

Bug fixes:

* ACM 2.6.2 images (BZ# 2126195)

* Infra MachineSet Replicate Taint (BZ# 2116528)

* Work agent panic when apply the manifestwork (BZ# 2120920)

* unexpected difference of behavior in inform policies with lists of
apiGroups for ClusterRole resources (BZ# 2130985)

3. Solution:

For Red Hat Advanced Cluster Management for Kubernetes, see the following
documentation, which will be updated shortly for this release, for
important
instructions on installing this release:

  https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing

4. Bugs fixed (  https://bugzilla.redhat.com/):

2101669 - CVE-2022-2238 search-api: SQL injection leads to remote denial of service
2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS
2111862 - CVE-2022-25896 passport: incorrect session regeneration
2116528 - Infra MachineSet Replicate Taint
2120920 - work agent panic when apply the manifestwork
2123376 - CVE-2022-25887 sanitize-html: insecure global regular expression replacement logic may lead to ReDoS
2126277 - CVE-2022-25858 terser: insecure use of regular expressions leads to ReDoS
2130985 - unexpected difference of behaviour in inform policies with lists of apiGroups for ClusterRole ressources

5. References:

  https://access.redhat.com/security/cve/CVE-2015-20107
  https://access.redhat.com/security/cve/CVE-2020-35525
  https://access.redhat.com/security/cve/CVE-2020-35527
  https://access.redhat.com/security/cve/CVE-2022-0391
  https://access.redhat.com/security/cve/CVE-2022-0494
  https://access.redhat.com/security/cve/CVE-2022-1353
  https://access.redhat.com/security/cve/CVE-2022-2238
  https://access.redhat.com/security/cve/CVE-2022-2509
  https://access.redhat.com/security/cve/CVE-2022-2588
  https://access.redhat.com/security/cve/CVE-2022-3515
  https://access.redhat.com/security/cve/CVE-2022-23816
  https://access.redhat.com/security/cve/CVE-2022-23825
  https://access.redhat.com/security/cve/CVE-2022-25858
  https://access.redhat.com/security/cve/CVE-2022-25887
  https://access.redhat.com/security/cve/CVE-2022-25896
  https://access.redhat.com/security/cve/CVE-2022-29900
  https://access.redhat.com/security/cve/CVE-2022-29901
  https://access.redhat.com/security/cve/CVE-2022-31129
  https://access.redhat.com/security/cve/CVE-2022-34903
  https://access.redhat.com/security/cve/CVE-2022-37434
  https://access.redhat.com/security/cve/CVE-2022-40674
  https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is . More contact
details at   https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.