- Issued:
- 2020-11-05
- Updated:
- 2020-11-05
RHEA-2020:4954 - Product Enhancement Advisory
Synopsis
Red Hat Advanced Cluster Management for Kubernetes version 2.1 images
Type/Severity
Product Enhancement Advisory
Topic
Red Hat Advanced Cluster Management for Kubernetes 2.1 General Availability release
Description
Red Hat Advanced Cluster Management for Kubernetes 2.1.0 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes. See the following Release Notes documentation, which will be updated shortly for this release, for details about this release:
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Advanced Cluster Management for Kubernetes 2.1 for RHEL 8 x86_64
- Red Hat Advanced Cluster Management for Kubernetes 2.1 for RHEL 7 x86_64
Fixes
- BZ - 1845755 - Adding label doesn't show up instantly
- BZ - 1861800 - ACM Lifecycle should not display ArgoCD applications
- BZ - 1861801 - RFE ACM should support cascading deletes
- BZ - 1866543 - Spoke cluster creation in a disconnected env: Cluster is stuck in "Cluster is pending import"
- BZ - 1876969 - Topology view faults
- BZ - 1879972 - Web UI for application topology has wrong status updates
- BZ - 1880039 - [OCP 4.6] Multicluster hub fails to deploy with helm version mismatch error (Operator index image install)
- BZ - 1882417 - [OCP 4.6 BM IPI / ACM 2.1.0] - Bare metal assets displaying "Asset sync failed" when allocated to spoke cluster
CVEs
- CVE-2017-12652
- CVE-2017-18551
- CVE-2018-20836
- CVE-2018-20843
- CVE-2019-5094
- CVE-2019-5188
- CVE-2019-5482
- CVE-2019-9454
- CVE-2019-9458
- CVE-2019-11068
- CVE-2019-11719
- CVE-2019-11727
- CVE-2019-11756
- CVE-2019-12450
- CVE-2019-12614
- CVE-2019-12749
- CVE-2019-14822
- CVE-2019-14866
- CVE-2019-15217
- CVE-2019-15807
- CVE-2019-15903
- CVE-2019-15917
- CVE-2019-16231
- CVE-2019-16233
- CVE-2019-16935
- CVE-2019-16994
- CVE-2019-17006
- CVE-2019-17023
- CVE-2019-17053
- CVE-2019-17055
- CVE-2019-17498
- CVE-2019-18197
- CVE-2019-18808
- CVE-2019-19046
- CVE-2019-19055
- CVE-2019-19058
- CVE-2019-19059
- CVE-2019-19062
- CVE-2019-19063
- CVE-2019-19126
- CVE-2019-19332
- CVE-2019-19447
- CVE-2019-19523
- CVE-2019-19524
- CVE-2019-19530
- CVE-2019-19534
- CVE-2019-19537
- CVE-2019-19767
- CVE-2019-19807
- CVE-2019-19956
- CVE-2019-20054
- CVE-2019-20095
- CVE-2019-20386
- CVE-2019-20388
- CVE-2019-20485
- CVE-2019-20636
- CVE-2020-1749
- CVE-2020-2732
- CVE-2020-6829
- CVE-2020-7595
- CVE-2020-8647
- CVE-2020-8649
- CVE-2020-9383
- CVE-2020-10690
- CVE-2020-10703
- CVE-2020-10732
- CVE-2020-10742
- CVE-2020-10751
- CVE-2020-10942
- CVE-2020-11565
- CVE-2020-12243
- CVE-2020-12351
- CVE-2020-12352
- CVE-2020-12400
- CVE-2020-12401
- CVE-2020-12402
- CVE-2020-12403
- CVE-2020-12770
- CVE-2020-12825
- CVE-2020-12826
- CVE-2020-14305
- CVE-2020-14331
- CVE-2020-14385
- CVE-2020-14386
- CVE-2020-25688
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.