Red Hat 8873 Published by

A Red Hat Advanced Cluster Management 2.3.6 security updates and bug fixes has been released.



RHSA-2022:0595-01: Important: Red Hat Advanced Cluster Management 2.3.6 security updates and bug fixes



=====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat Advanced Cluster Management 2.3.6 security updates and bug fixes
Advisory ID: RHSA-2022:0595-02
Product: Red Hat ACM
Advisory URL:   https://access.redhat.com/errata/RHSA-2022:0595
Issue date: 2022-02-22
Updated on: 2022-03-04
CVE Names: CVE-2020-25704 CVE-2020-36322 CVE-2021-3521
CVE-2021-3712 CVE-2021-3872 CVE-2021-3918
CVE-2021-3984 CVE-2021-4019 CVE-2021-4034
CVE-2021-4122 CVE-2021-4155 CVE-2021-4192
CVE-2021-4193 CVE-2021-20321 CVE-2021-23566
CVE-2021-42574 CVE-2021-42739 CVE-2021-43565
CVE-2022-0155 CVE-2022-0185 CVE-2022-20612
CVE-2022-20617
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.3.6 General
Availability
release images, which provide security updates and bug fixes.

Red Hat Product Security has rated this update as having a security impact
of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives
a detailed severity rating, is available for each vulnerability from the
CVE
link(s) in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.3.6 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which provide some security fixes and bug fixes.
See the following Release Notes documentation, which will be updated
shortly for this release, for additional details about this release:

  https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/

Security updates:

* Nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)

* Nanoid: Information disclosure via valueOf() function (CVE-2021-23566)

* Golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)

* Follow-redirects: Exposure of Private Personal Information to an
Unauthorized Actor (CVE-2022-0155)

Bug fixes:

* Inform ACM policy is not checking properly the node fields (BZ# 2015588)

* ImagePullPolicy is "Always" for multicluster-operators-subscription-rhel8
image (BZ# 2021128)

* Traceback blocks reconciliation of helm repository hosted on AWS S3
storage (BZ# 2021576)

* RHACM 2.3.6 images (BZ# 2029507)

* Console UI enabled SNO UI Options not displayed during cluster creating
(BZ# 2030002)

* Grc pod restarts for each new GET request to the Governance Policy Page
(BZ# 2037351)

* Clustersets do not appear in UI (BZ# 2049810)

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

  https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html-single/install/index#installing

4. Bugs fixed (  https://bugzilla.redhat.com/):

2015588 - Inform ACM policy is not checking properly the node fields
2021128 - imagePullPolicy is "Always" for multicluster-operators-subscription-rhel8 image
2021576 - traceback blocks reconciliation of helm repository hosted on AWS S3 storage
2024702 - CVE-2021-3918 nodejs-json-schema: Prototype pollution vulnerability
2029507 - RHACM 2.3.6 images
2030002 - Console UI enabled SNO UI Options not displayed during cluster creating
2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic
2037351 - grc pod restarts for each new GET request to the Governance Policy Page
2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor
2049810 - Clustersets do not appear in UI
2050853 - CVE-2021-23566 nanoid: Information disclosure via valueOf() function

5. References:

  https://access.redhat.com/security/cve/CVE-2020-25704
  https://access.redhat.com/security/cve/CVE-2020-36322
  https://access.redhat.com/security/cve/CVE-2021-3521
  https://access.redhat.com/security/cve/CVE-2021-3712
  https://access.redhat.com/security/cve/CVE-2021-3872
  https://access.redhat.com/security/cve/CVE-2021-3918
  https://access.redhat.com/security/cve/CVE-2021-3984
  https://access.redhat.com/security/cve/CVE-2021-4019
  https://access.redhat.com/security/cve/CVE-2021-4034
  https://access.redhat.com/security/cve/CVE-2021-4122
  https://access.redhat.com/security/cve/CVE-2021-4155
  https://access.redhat.com/security/cve/CVE-2021-4192
  https://access.redhat.com/security/cve/CVE-2021-4193
  https://access.redhat.com/security/cve/CVE-2021-20321
  https://access.redhat.com/security/cve/CVE-2021-23566
  https://access.redhat.com/security/cve/CVE-2021-42574
  https://access.redhat.com/security/cve/CVE-2021-42739
  https://access.redhat.com/security/cve/CVE-2021-43565
  https://access.redhat.com/security/cve/CVE-2022-0155
  https://access.redhat.com/security/cve/CVE-2022-0185
  https://access.redhat.com/security/cve/CVE-2022-20612
  https://access.redhat.com/security/cve/CVE-2022-20617
  https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is . More contact
details at   https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.