Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2021:3016 - Security Advisory
Issued:
2021-08-05
Updated:
2021-08-05

RHSA-2021:3016 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: Red Hat Advanced Cluster Management for Kubernetes version 2.3

Type/Severity

Security Advisory: Important

Topic

Red Hat Advanced Cluster Management for Kubernetes 2.3.0 General
Availability release images, which fix several bugs and security issues.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

Description

Red Hat Advanced Cluster Management for Kubernetes 2.3.0 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs and security issues. See
the following Release Notes documentation, which will be updated shortly
for this release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.3/html/release_notes/

Security:

  • fastify-reply-from: crafted URL allows prefix scape of the proxied backend service (CVE-2021-21321)
  • fastify-http-proxy: crafted URL allows prefix scape of the proxied

backend service (CVE-2021-21322)

  • nodejs-netmask: improper input validation of octal input data (CVE-2021-28918)
  • redis: Integer overflow via STRALGO LCS command (CVE-2021-29477)
  • redis: Integer overflow via COPY command for large intsets (CVE-2021-29478)
  • nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
  • nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions

(CVE-2020-28500)

  • golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
  • golang.org/x/text: Panic in language.ParseAcceptLanguage while processing

bcp47 tag (CVE-2020-28852)

  • nodejs-ansi_up: XSS due to insufficient URL sanitization (CVE-2021-3377)
  • oras: zip-slip vulnerability via oras-pull (CVE-2021-21272)
  • redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms (CVE-2021-21309)
  • nodejs-lodash: command injection via template (CVE-2021-23337)
  • nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362)
  • browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS) (CVE-2021-23364)
  • nodejs-postcss: Regular expression denial of service during source map parsing (CVE-2021-23368)
  • nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option (CVE-2021-23369)
  • nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js (CVE-2021-23382)
  • nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option (CVE-2021-23383)
  • openssl: integer overflow in CipherUpdate (CVE-2021-23840)
  • openssl: NULL pointer dereference in X509_issuer_and_serial_hash()

(CVE-2021-23841)

  • nodejs-ua-parser-js: ReDoS via malicious User-Agent header (CVE-2021-27292)
  • grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call (CVE-2021-27358)
  • nodejs-is-svg: ReDoS via malicious string (CVE-2021-28092)
  • nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character (CVE-2021-29418)
  • ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)
  • normalize-url: ReDoS for data URLs (CVE-2021-33502)
  • nodejs-trim-newlines: ReDoS in .end() method (CVE-2021-33623)
  • nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)
  • html-parse-stringify: Regular Expression DoS (CVE-2021-23346)
  • openssl: incorrect SSLv2 rollback protection (CVE-2021-23839)

For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
pages listed in the References section.

Bugs:

  • RFE Make the source code for the endpoint-metrics-operator public (BZ# 1913444)
  • cluster became offline after apiserver health check (BZ# 1942589)

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html-single/install/index#installing

Affected Products

  • Red Hat Advanced Cluster Management for Kubernetes 2 for RHEL 8 x86_64
  • Red Hat Advanced Cluster Management for Kubernetes 2 for RHEL 7 x86_64

Fixes

  • BZ - 1913333 - CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension
  • BZ - 1913338 - CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag
  • BZ - 1913444 - RFE Make the source code for the endpoint-metrics-operator public
  • BZ - 1921286 - CVE-2021-21272 oras: zip-slip vulnerability via oras-pull
  • BZ - 1927520 - RHACM 2.3.0 images
  • BZ - 1928937 - CVE-2021-23337 nodejs-lodash: command injection via template
  • BZ - 1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
  • BZ - 1930294 - CVE-2021-23839 openssl: incorrect SSLv2 rollback protection
  • BZ - 1930310 - CVE-2021-23841 openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
  • BZ - 1930324 - CVE-2021-23840 openssl: integer overflow in CipherUpdate
  • BZ - 1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms
  • BZ - 1936427 - CVE-2021-3377 nodejs-ansi_up: XSS due to insufficient URL sanitization
  • BZ - 1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string
  • BZ - 1940196 - View Resource YAML option shows 404 error when reviewing a Subscription for an application
  • BZ - 1940613 - CVE-2021-27292 nodejs-ua-parser-js: ReDoS via malicious User-Agent header
  • BZ - 1941024 - CVE-2021-27358 grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call
  • BZ - 1941675 - CVE-2021-23346 html-parse-stringify: Regular Expression DoS
  • BZ - 1942178 - CVE-2021-21321 fastify-reply-from: crafted URL allows prefix scape of the proxied backend service
  • BZ - 1942182 - CVE-2021-21322 fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service
  • BZ - 1942589 - cluster became offline after apiserver health check
  • BZ - 1943208 - CVE-2021-23362 nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()
  • BZ - 1944822 - CVE-2021-29418 nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character
  • BZ - 1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data
  • BZ - 1945459 - CVE-2020-28469 nodejs-glob-parent: Regular expression denial of service
  • BZ - 1948761 - CVE-2021-23369 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option
  • BZ - 1948763 - CVE-2021-23368 nodejs-postcss: Regular expression denial of service during source map parsing
  • BZ - 1954150 - CVE-2021-23382 nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js
  • BZ - 1954368 - CVE-2021-29482 ulikunitz/xz: Infinite loop in readUvarint allows for denial of service
  • BZ - 1955619 - CVE-2021-23364 browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS)
  • BZ - 1956688 - CVE-2021-23383 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option
  • BZ - 1956818 - CVE-2021-23343 nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe
  • BZ - 1957410 - CVE-2021-29477 redis: Integer overflow via STRALGO LCS command
  • BZ - 1957414 - CVE-2021-29478 redis: Integer overflow via COPY command for large intsets
  • BZ - 1964461 - CVE-2021-33502 normalize-url: ReDoS for data URLs
  • BZ - 1966615 - CVE-2021-33623 nodejs-trim-newlines: ReDoS in .end() method
  • BZ - 1968122 - clusterdeployment fails because hiveadmission sc does not have correct permissions
  • BZ - 1972703 - Subctl fails to join cluster, since it cannot auto-generate a valid cluster id
  • BZ - 1983131 - Defragmenting an etcd member doesn't reduce the DB size (7.5GB) on a setup with ~1000 spoke clusters

CVEs

  • CVE-2016-10228
  • CVE-2017-14502
  • CVE-2018-20843
  • CVE-2018-1000858
  • CVE-2019-2708
  • CVE-2019-9169
  • CVE-2019-13050
  • CVE-2019-13627
  • CVE-2019-14889
  • CVE-2019-15903
  • CVE-2019-19906
  • CVE-2019-20454
  • CVE-2019-20934
  • CVE-2019-25013
  • CVE-2020-1730
  • CVE-2020-8231
  • CVE-2020-8284
  • CVE-2020-8285
  • CVE-2020-8286
  • CVE-2020-8927
  • CVE-2020-11668
  • CVE-2020-13434
  • CVE-2020-15358
  • CVE-2020-27618
  • CVE-2020-28196
  • CVE-2020-28469
  • CVE-2020-28500
  • CVE-2020-28851
  • CVE-2020-28852
  • CVE-2020-29361
  • CVE-2020-29362
  • CVE-2020-29363
  • CVE-2021-3326
  • CVE-2021-3377
  • CVE-2021-3449
  • CVE-2021-3450
  • CVE-2021-3516
  • CVE-2021-3517
  • CVE-2021-3518
  • CVE-2021-3520
  • CVE-2021-3537
  • CVE-2021-3541
  • CVE-2021-3560
  • CVE-2021-20271
  • CVE-2021-20305
  • CVE-2021-21272
  • CVE-2021-21309
  • CVE-2021-21321
  • CVE-2021-21322
  • CVE-2021-23337
  • CVE-2021-23343
  • CVE-2021-23346
  • CVE-2021-23362
  • CVE-2021-23364
  • CVE-2021-23368
  • CVE-2021-23369
  • CVE-2021-23382
  • CVE-2021-23383
  • CVE-2021-23839
  • CVE-2021-23840
  • CVE-2021-23841
  • CVE-2021-25217
  • CVE-2021-27219
  • CVE-2021-27292
  • CVE-2021-27358
  • CVE-2021-28092
  • CVE-2021-28918
  • CVE-2021-29418
  • CVE-2021-29477
  • CVE-2021-29478
  • CVE-2021-29482
  • CVE-2021-32399
  • CVE-2021-33033
  • CVE-2021-33034
  • CVE-2021-33502
  • CVE-2021-33623
  • CVE-2021-33909
  • CVE-2021-33910

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Advanced Cluster Management for Kubernetes 2 for RHEL 8

SRPM
x86_64

Red Hat Advanced Cluster Management for Kubernetes 2 for RHEL 7

SRPM
x86_64

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter