- Issued:
- 2025-03-19
- Updated:
- 2025-03-19
RHEA-2025:3039 - Product Enhancement Advisory
Synopsis
RHEA: Submariner 0.19.3 - bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Topic
Submariner 0.19.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.12
Description
Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud.
For more information about Submariner, see the Submariner open source community website at: https://submariner.io/.
This advisory contains bug fixes and enhancements to the Submariner container images.
Solution
To learn more about Submariner, see https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_management_for_kubernetes/2.12/html/networking/networking#submariner.
Affected Products
- Red Hat Advanced Cluster Management for Kubernetes 2 for RHEL 9 x86_64
Fixes
- HYPBLD-614 - Release Submariner 0.19.3 for ACM 2.12
- ACM-17297 - [Submariner0.19]The connection status of the submariner is degraded for Provider RDR setup
CVEs
- CVE-2007-4559
- CVE-2019-12900
- CVE-2020-11023
- CVE-2021-35937
- CVE-2021-35938
- CVE-2021-35939
- CVE-2021-41043
- CVE-2021-43618
- CVE-2022-48468
- CVE-2022-48554
- CVE-2022-49043
- CVE-2023-4016
- CVE-2023-5981
- CVE-2023-6597
- CVE-2023-7008
- CVE-2023-7104
- CVE-2023-7250
- CVE-2023-27043
- CVE-2023-27533
- CVE-2023-27534
- CVE-2023-27536
- CVE-2023-27538
- CVE-2023-29491
- CVE-2023-29499
- CVE-2023-32611
- CVE-2023-32665
- CVE-2023-36054
- CVE-2023-37920
- CVE-2023-38545
- CVE-2023-38546
- CVE-2023-39615
- CVE-2023-39975
- CVE-2023-44487
- CVE-2023-46218
- CVE-2023-50387
- CVE-2023-50868
- CVE-2023-52425
- CVE-2024-0450
- CVE-2024-0553
- CVE-2024-0567
- CVE-2024-1488
- CVE-2024-2236
- CVE-2024-2398
- CVE-2024-2961
- CVE-2024-3596
- CVE-2024-4032
- CVE-2024-6232
- CVE-2024-6345
- CVE-2024-6923
- CVE-2024-8088
- CVE-2024-8508
- CVE-2024-9287
- CVE-2024-10041
- CVE-2024-10963
- CVE-2024-11168
- CVE-2024-11187
- CVE-2024-12797
- CVE-2024-22365
- CVE-2024-24806
- CVE-2024-25062
- CVE-2024-26306
- CVE-2024-26458
- CVE-2024-26461
- CVE-2024-26462
- CVE-2024-28182
- CVE-2024-28757
- CVE-2024-28834
- CVE-2024-28835
- CVE-2024-33599
- CVE-2024-33600
- CVE-2024-33601
- CVE-2024-33602
- CVE-2024-34397
- CVE-2024-37370
- CVE-2024-37371
- CVE-2024-45336
- CVE-2024-45490
- CVE-2024-45491
- CVE-2024-45492
- CVE-2024-50602
- CVE-2024-53580
- CVE-2024-56171
- CVE-2025-22866
- CVE-2025-24928
References
(none)
aarch64
| rhacm2/lighthouse-agent-rhel9@sha256:caabfddfab139ee4717eaf43d2d18b841a773aa1dfe4cb46b125670cf6758aaf |
| rhacm2/lighthouse-coredns-rhel9@sha256:f22858c05afd8db4997eeb638b86b121b01e0c277c314a0f6275556e4b147cb4 |
| rhacm2/nettest-rhel9@sha256:28003d5647522aeff8a15bff9b5073604008900f8948c1760c506f1dce48c46f |
| rhacm2/subctl-rhel9@sha256:17919fa48313e3e3c50ed4ec6a7a83664eb62a237195701d6c36f34611ff7e1e |
| rhacm2/submariner-gateway-rhel9@sha256:5dffcc79a7d26ba681c9d105fed2410d28ab7b975892dcd2770ae90248f42777 |
| rhacm2/submariner-globalnet-rhel9@sha256:c6278150aba5359c6dd1eed354421347d3356c18bb7ba445348985edde57c692 |
| rhacm2/submariner-operator-bundle@sha256:4fff3a8e35cddb335e11a45b84c32de2790e62f0292fa7919b71fe2cfddd7d3a |
| rhacm2/submariner-rhel9-operator@sha256:9270a07978b0ca5026e98d5fa70572f5c6726d0118ebf2288d5ee9f62dcb1a73 |
| rhacm2/submariner-route-agent-rhel9@sha256:06deb0f2c81753ac927d437ca77efeb3dbfc19b0506a900433f65191661d146a |
ppc64le
| rhacm2/lighthouse-agent-rhel9@sha256:30ec5310eb49a4b6636b043c3c44186aafdf80cdefb5bb83a193f2966bc438b9 |
| rhacm2/lighthouse-coredns-rhel9@sha256:ff102a7daf667880f5dc6c22d6d43ae6ed4300e2d8c78b41b90507efbcfa9f3e |
| rhacm2/nettest-rhel9@sha256:7ef1393c01060bc26b0a48db41a3139e72ec138953f6e62b6c55c1e8e3a51fea |
| rhacm2/subctl-rhel9@sha256:fb302a537effe2cf104d4d7835f751bd2853a76450e9631dcda386a47a39a657 |
| rhacm2/submariner-gateway-rhel9@sha256:4bc712ef4c58c7e7e33ad54fb91378c5da171471cd7de6da5e80e3bb23d768a0 |
| rhacm2/submariner-globalnet-rhel9@sha256:e4d7762cdc09a659df01d2f62b64e2a7474960982a012bef38f530d9eee8cca1 |
| rhacm2/submariner-operator-bundle@sha256:3e35b075c312d0d2b58c8ebe4b0544ba65d6658a5a1c3f4f5993cfe628b1b9c2 |
| rhacm2/submariner-rhel9-operator@sha256:071aa7ca5fc4aee89b6b6174a6560d4571c3c9feaf80e44dfffa8dc0d02087fc |
| rhacm2/submariner-route-agent-rhel9@sha256:919c2e57a868427ef8530ba86196b3de7ae7e9da3fe10058acc1696b7e6c03d2 |
s390x
| rhacm2/lighthouse-agent-rhel9@sha256:c475bd27e2cb3d28c84ef6aeafd95646bf54355a055443b4eb45215d7ca391a0 |
| rhacm2/lighthouse-coredns-rhel9@sha256:0eef1850de8a8d0ae2b0a9452d347e3e0ac5fcce12c2a5af82d0304bf28ded16 |
| rhacm2/nettest-rhel9@sha256:3e46a97b625a8c489241c5cadabb32befe1adc034cf34e024aa83102b1dcc64b |
| rhacm2/subctl-rhel9@sha256:0930e1895a3b6d40910b7d2ab8a57e49183065d9aae8d290a01f16f438ba9ec9 |
| rhacm2/submariner-gateway-rhel9@sha256:5c6f55c5fa1393933856e5de4737aab50a72550cd88f402e173ebc6199cad4e3 |
| rhacm2/submariner-globalnet-rhel9@sha256:7a3bd5a72e1002faf309b4535e16fa43c1fcc2090c77e55cbe6f037ee70c3992 |
| rhacm2/submariner-operator-bundle@sha256:e8ebe2b9f16ad35d551e6cd093257f490f9d6328f7273082221663124a842feb |
| rhacm2/submariner-rhel9-operator@sha256:6f6746c780789227ecb05e6f1aa6124de86e9139435f953483cbd13974752ecc |
| rhacm2/submariner-route-agent-rhel9@sha256:f9a98066f50de62ffbb6ebd801c0cc26c67ff5cb9b2118ba32a4969cf77b2eec |
x86_64
| rhacm2/lighthouse-agent-rhel9@sha256:b216402f203d83592927c5e874eb340fb6753c1f734599be86d9023542d6aba1 |
| rhacm2/lighthouse-coredns-rhel9@sha256:f1940a4facb8e1d94dc649a75be3510cf96fb3770d7da53a4fdebfae6de4542a |
| rhacm2/nettest-rhel9@sha256:34fda13dfaeac70f53c91788076036c013091dd13402e175a33c406d4f96cd15 |
| rhacm2/subctl-rhel9@sha256:f99d2dfedab582d50968ec3094521121ca56d928fc8f75a5b3ee48c67dcb4b42 |
| rhacm2/submariner-gateway-rhel9@sha256:55ed2a68e1ae7e27a125eca8849985f92614ea8eb8acc61233c9166de25cd705 |
| rhacm2/submariner-globalnet-rhel9@sha256:f3356bf265f306ecb715ef6f2fb90b7b73067e97949c45d4ab18229555190130 |
| rhacm2/submariner-operator-bundle@sha256:f4ea01e2f273f0695677909bde83546c89657bab50d93d039c31cb28a61fc8fd |
| rhacm2/submariner-rhel9-operator@sha256:1b08122427f5de68af959e6165bd46512f831e06d8e7a2756ef0b1488e941c83 |
| rhacm2/submariner-route-agent-rhel9@sha256:ae0d074f3ea4edb5287bbf3a0ff9840b31dded19516dd063f1a357ad63c2f5ca |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.