- Issued:
- 2021-08-05
- Updated:
- 2021-08-05
RHSA-2021:3016 - Security Advisory
Synopsis
Important: Red Hat Advanced Cluster Management for Kubernetes version 2.3
Type/Severity
Security Advisory: Important
Topic
Red Hat Advanced Cluster Management for Kubernetes 2.3.0 General
Availability release images, which fix several bugs and security issues.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.
Description
Red Hat Advanced Cluster Management for Kubernetes 2.3.0 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs and security issues. See
the following Release Notes documentation, which will be updated shortly
for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.3/html/release_notes/
Security:
- fastify-reply-from: crafted URL allows prefix scape of the proxied backend service (CVE-2021-21321)
- fastify-http-proxy: crafted URL allows prefix scape of the proxied
backend service (CVE-2021-21322)
- nodejs-netmask: improper input validation of octal input data (CVE-2021-28918)
- redis: Integer overflow via STRALGO LCS command (CVE-2021-29477)
- redis: Integer overflow via COPY command for large intsets (CVE-2021-29478)
- nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
- nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
(CVE-2020-28500)
- golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
- golang.org/x/text: Panic in language.ParseAcceptLanguage while processing
bcp47 tag (CVE-2020-28852)
- nodejs-ansi_up: XSS due to insufficient URL sanitization (CVE-2021-3377)
- oras: zip-slip vulnerability via oras-pull (CVE-2021-21272)
- redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms (CVE-2021-21309)
- nodejs-lodash: command injection via template (CVE-2021-23337)
- nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362)
- browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS) (CVE-2021-23364)
- nodejs-postcss: Regular expression denial of service during source map parsing (CVE-2021-23368)
- nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option (CVE-2021-23369)
- nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js (CVE-2021-23382)
- nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option (CVE-2021-23383)
- openssl: integer overflow in CipherUpdate (CVE-2021-23840)
- openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
(CVE-2021-23841)
- nodejs-ua-parser-js: ReDoS via malicious User-Agent header (CVE-2021-27292)
- grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call (CVE-2021-27358)
- nodejs-is-svg: ReDoS via malicious string (CVE-2021-28092)
- nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character (CVE-2021-29418)
- ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)
- normalize-url: ReDoS for data URLs (CVE-2021-33502)
- nodejs-trim-newlines: ReDoS in .end() method (CVE-2021-33623)
- nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)
- html-parse-stringify: Regular Expression DoS (CVE-2021-23346)
- openssl: incorrect SSLv2 rollback protection (CVE-2021-23839)
For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
pages listed in the References section.
Bugs:
- RFE Make the source code for the endpoint-metrics-operator public (BZ# 1913444)
- cluster became offline after apiserver health check (BZ# 1942589)
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Advanced Cluster Management for Kubernetes 2 for RHEL 8 x86_64
- Red Hat Advanced Cluster Management for Kubernetes 2 for RHEL 7 x86_64
Fixes
- BZ - 1913333 - CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension
- BZ - 1913338 - CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag
- BZ - 1913444 - RFE Make the source code for the endpoint-metrics-operator public
- BZ - 1921286 - CVE-2021-21272 oras: zip-slip vulnerability via oras-pull
- BZ - 1927520 - RHACM 2.3.0 images
- BZ - 1928937 - CVE-2021-23337 nodejs-lodash: command injection via template
- BZ - 1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
- BZ - 1930294 - CVE-2021-23839 openssl: incorrect SSLv2 rollback protection
- BZ - 1930310 - CVE-2021-23841 openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
- BZ - 1930324 - CVE-2021-23840 openssl: integer overflow in CipherUpdate
- BZ - 1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms
- BZ - 1936427 - CVE-2021-3377 nodejs-ansi_up: XSS due to insufficient URL sanitization
- BZ - 1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string
- BZ - 1940196 - View Resource YAML option shows 404 error when reviewing a Subscription for an application
- BZ - 1940613 - CVE-2021-27292 nodejs-ua-parser-js: ReDoS via malicious User-Agent header
- BZ - 1941024 - CVE-2021-27358 grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call
- BZ - 1941675 - CVE-2021-23346 html-parse-stringify: Regular Expression DoS
- BZ - 1942178 - CVE-2021-21321 fastify-reply-from: crafted URL allows prefix scape of the proxied backend service
- BZ - 1942182 - CVE-2021-21322 fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service
- BZ - 1942589 - cluster became offline after apiserver health check
- BZ - 1943208 - CVE-2021-23362 nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()
- BZ - 1944822 - CVE-2021-29418 nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character
- BZ - 1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data
- BZ - 1945459 - CVE-2020-28469 nodejs-glob-parent: Regular expression denial of service
- BZ - 1948761 - CVE-2021-23369 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option
- BZ - 1948763 - CVE-2021-23368 nodejs-postcss: Regular expression denial of service during source map parsing
- BZ - 1954150 - CVE-2021-23382 nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js
- BZ - 1954368 - CVE-2021-29482 ulikunitz/xz: Infinite loop in readUvarint allows for denial of service
- BZ - 1955619 - CVE-2021-23364 browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS)
- BZ - 1956688 - CVE-2021-23383 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option
- BZ - 1956818 - CVE-2021-23343 nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe
- BZ - 1957410 - CVE-2021-29477 redis: Integer overflow via STRALGO LCS command
- BZ - 1957414 - CVE-2021-29478 redis: Integer overflow via COPY command for large intsets
- BZ - 1964461 - CVE-2021-33502 normalize-url: ReDoS for data URLs
- BZ - 1966615 - CVE-2021-33623 nodejs-trim-newlines: ReDoS in .end() method
- BZ - 1968122 - clusterdeployment fails because hiveadmission sc does not have correct permissions
- BZ - 1972703 - Subctl fails to join cluster, since it cannot auto-generate a valid cluster id
- BZ - 1983131 - Defragmenting an etcd member doesn't reduce the DB size (7.5GB) on a setup with ~1000 spoke clusters
CVEs
- CVE-2016-10228
- CVE-2017-14502
- CVE-2018-20843
- CVE-2018-1000858
- CVE-2019-2708
- CVE-2019-9169
- CVE-2019-13050
- CVE-2019-13627
- CVE-2019-14889
- CVE-2019-15903
- CVE-2019-19906
- CVE-2019-20454
- CVE-2019-20934
- CVE-2019-25013
- CVE-2020-1730
- CVE-2020-8231
- CVE-2020-8284
- CVE-2020-8285
- CVE-2020-8286
- CVE-2020-8927
- CVE-2020-11668
- CVE-2020-13434
- CVE-2020-15358
- CVE-2020-27618
- CVE-2020-28196
- CVE-2020-28469
- CVE-2020-28500
- CVE-2020-28851
- CVE-2020-28852
- CVE-2020-29361
- CVE-2020-29362
- CVE-2020-29363
- CVE-2021-3326
- CVE-2021-3377
- CVE-2021-3449
- CVE-2021-3450
- CVE-2021-3516
- CVE-2021-3517
- CVE-2021-3518
- CVE-2021-3520
- CVE-2021-3537
- CVE-2021-3541
- CVE-2021-3560
- CVE-2021-20271
- CVE-2021-20305
- CVE-2021-21272
- CVE-2021-21309
- CVE-2021-21321
- CVE-2021-21322
- CVE-2021-23337
- CVE-2021-23343
- CVE-2021-23346
- CVE-2021-23362
- CVE-2021-23364
- CVE-2021-23368
- CVE-2021-23369
- CVE-2021-23382
- CVE-2021-23383
- CVE-2021-23839
- CVE-2021-23840
- CVE-2021-23841
- CVE-2021-25217
- CVE-2021-27219
- CVE-2021-27292
- CVE-2021-27358
- CVE-2021-28092
- CVE-2021-28918
- CVE-2021-29418
- CVE-2021-29477
- CVE-2021-29478
- CVE-2021-29482
- CVE-2021-32399
- CVE-2021-33033
- CVE-2021-33034
- CVE-2021-33502
- CVE-2021-33623
- CVE-2021-33909
- CVE-2021-33910
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.