Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2021:3016 - Security Advisory
Issued:
2021-08-05
Updated:
2021-08-05

RHSA-2021:3016 - Security Advisory

  • Overview

Synopsis

Important: Red Hat Advanced Cluster Management for Kubernetes version 2.3

Type/Severity

Security Advisory: Important

Topic

Red Hat Advanced Cluster Management for Kubernetes 2.3.0 General
Availability release images, which fix several bugs and security issues.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

Description

Red Hat Advanced Cluster Management for Kubernetes 2.3.0 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs and security issues. See
the following Release Notes documentation, which will be updated shortly
for this release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.3/html/release_notes/

Security:

  • fastify-reply-from: crafted URL allows prefix scape of the proxied backend service (CVE-2021-21321)
  • fastify-http-proxy: crafted URL allows prefix scape of the proxied

backend service (CVE-2021-21322)

  • nodejs-netmask: improper input validation of octal input data (CVE-2021-28918)
  • redis: Integer overflow via STRALGO LCS command (CVE-2021-29477)
  • redis: Integer overflow via COPY command for large intsets (CVE-2021-29478)
  • nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
  • nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions

(CVE-2020-28500)

  • golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
  • golang.org/x/text: Panic in language.ParseAcceptLanguage while processing

bcp47 tag (CVE-2020-28852)

  • nodejs-ansi_up: XSS due to insufficient URL sanitization (CVE-2021-3377)
  • oras: zip-slip vulnerability via oras-pull (CVE-2021-21272)
  • redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms (CVE-2021-21309)
  • nodejs-lodash: command injection via template (CVE-2021-23337)
  • nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362)
  • browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS) (CVE-2021-23364)
  • nodejs-postcss: Regular expression denial of service during source map parsing (CVE-2021-23368)
  • nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option (CVE-2021-23369)
  • nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js (CVE-2021-23382)
  • nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option (CVE-2021-23383)
  • openssl: integer overflow in CipherUpdate (CVE-2021-23840)
  • openssl: NULL pointer dereference in X509_issuer_and_serial_hash()

(CVE-2021-23841)

  • nodejs-ua-parser-js: ReDoS via malicious User-Agent header (CVE-2021-27292)
  • grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call (CVE-2021-27358)
  • nodejs-is-svg: ReDoS via malicious string (CVE-2021-28092)
  • nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character (CVE-2021-29418)
  • ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)
  • normalize-url: ReDoS for data URLs (CVE-2021-33502)
  • nodejs-trim-newlines: ReDoS in .end() method (CVE-2021-33623)
  • nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)
  • html-parse-stringify: Regular Expression DoS (CVE-2021-23346)
  • openssl: incorrect SSLv2 rollback protection (CVE-2021-23839)

For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
pages listed in the References section.

Bugs:

  • RFE Make the source code for the endpoint-metrics-operator public (BZ# 1913444)
  • cluster became offline after apiserver health check (BZ# 1942589)

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html-single/install/index#installing

Affected Products

  • Red Hat Advanced Cluster Management for Kubernetes 2 for RHEL 8 x86_64
  • Red Hat Advanced Cluster Management for Kubernetes 2 for RHEL 7 x86_64

Fixes

  • BZ - 1913333 - CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension
  • BZ - 1913338 - CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag
  • BZ - 1913444 - RFE Make the source code for the endpoint-metrics-operator public
  • BZ - 1921286 - CVE-2021-21272 oras: zip-slip vulnerability via oras-pull
  • BZ - 1927520 - RHACM 2.3.0 images
  • BZ - 1928937 - CVE-2021-23337 nodejs-lodash: command injection via template
  • BZ - 1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
  • BZ - 1930294 - CVE-2021-23839 openssl: incorrect SSLv2 rollback protection
  • BZ - 1930310 - CVE-2021-23841 openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
  • BZ - 1930324 - CVE-2021-23840 openssl: integer overflow in CipherUpdate
  • BZ - 1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms
  • BZ - 1936427 - CVE-2021-3377 nodejs-ansi_up: XSS due to insufficient URL sanitization
  • BZ - 1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string
  • BZ - 1940196 - View Resource YAML option shows 404 error when reviewing a Subscription for an application
  • BZ - 1940613 - CVE-2021-27292 nodejs-ua-parser-js: ReDoS via malicious User-Agent header
  • BZ - 1941024 - CVE-2021-27358 grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call
  • BZ - 1941675 - CVE-2021-23346 html-parse-stringify: Regular Expression DoS
  • BZ - 1942178 - CVE-2021-21321 fastify-reply-from: crafted URL allows prefix scape of the proxied backend service
  • BZ - 1942182 - CVE-2021-21322 fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service
  • BZ - 1942589 - cluster became offline after apiserver health check
  • BZ - 1943208 - CVE-2021-23362 nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()
  • BZ - 1944822 - CVE-2021-29418 nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character
  • BZ - 1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data
  • BZ - 1945459 - CVE-2020-28469 nodejs-glob-parent: Regular expression denial of service
  • BZ - 1948761 - CVE-2021-23369 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option
  • BZ - 1948763 - CVE-2021-23368 nodejs-postcss: Regular expression denial of service during source map parsing
  • BZ - 1954150 - CVE-2021-23382 nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js
  • BZ - 1954368 - CVE-2021-29482 ulikunitz/xz: Infinite loop in readUvarint allows for denial of service
  • BZ - 1955619 - CVE-2021-23364 browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS)
  • BZ - 1956688 - CVE-2021-23383 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option
  • BZ - 1956818 - CVE-2021-23343 nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe
  • BZ - 1957410 - CVE-2021-29477 redis: Integer overflow via STRALGO LCS command
  • BZ - 1957414 - CVE-2021-29478 redis: Integer overflow via COPY command for large intsets
  • BZ - 1964461 - CVE-2021-33502 normalize-url: ReDoS for data URLs
  • BZ - 1966615 - CVE-2021-33623 nodejs-trim-newlines: ReDoS in .end() method
  • BZ - 1968122 - clusterdeployment fails because hiveadmission sc does not have correct permissions
  • BZ - 1972703 - Subctl fails to join cluster, since it cannot auto-generate a valid cluster id
  • BZ - 1983131 - Defragmenting an etcd member doesn't reduce the DB size (7.5GB) on a setup with ~1000 spoke clusters

CVEs

  • CVE-2016-10228
  • CVE-2017-14502
  • CVE-2018-20843
  • CVE-2018-1000858
  • CVE-2019-2708
  • CVE-2019-9169
  • CVE-2019-13050
  • CVE-2019-13627
  • CVE-2019-14889
  • CVE-2019-15903
  • CVE-2019-19906
  • CVE-2019-20454
  • CVE-2019-20934
  • CVE-2019-25013
  • CVE-2020-1730
  • CVE-2020-8231
  • CVE-2020-8284
  • CVE-2020-8285
  • CVE-2020-8286
  • CVE-2020-8927
  • CVE-2020-11668
  • CVE-2020-13434
  • CVE-2020-15358
  • CVE-2020-27618
  • CVE-2020-28196
  • CVE-2020-28469
  • CVE-2020-28500
  • CVE-2020-28851
  • CVE-2020-28852
  • CVE-2020-29361
  • CVE-2020-29362
  • CVE-2020-29363
  • CVE-2021-3326
  • CVE-2021-3377
  • CVE-2021-3449
  • CVE-2021-3450
  • CVE-2021-3516
  • CVE-2021-3517
  • CVE-2021-3518
  • CVE-2021-3520
  • CVE-2021-3537
  • CVE-2021-3541
  • CVE-2021-3560
  • CVE-2021-20271
  • CVE-2021-20305
  • CVE-2021-21272
  • CVE-2021-21309
  • CVE-2021-21321
  • CVE-2021-21322
  • CVE-2021-23337
  • CVE-2021-23343
  • CVE-2021-23346
  • CVE-2021-23362
  • CVE-2021-23364
  • CVE-2021-23368
  • CVE-2021-23369
  • CVE-2021-23382
  • CVE-2021-23383
  • CVE-2021-23839
  • CVE-2021-23840
  • CVE-2021-23841
  • CVE-2021-25217
  • CVE-2021-27219
  • CVE-2021-27292
  • CVE-2021-27358
  • CVE-2021-28092
  • CVE-2021-28918
  • CVE-2021-29418
  • CVE-2021-29477
  • CVE-2021-29478
  • CVE-2021-29482
  • CVE-2021-32399
  • CVE-2021-33033
  • CVE-2021-33034
  • CVE-2021-33502
  • CVE-2021-33623
  • CVE-2021-33909
  • CVE-2021-33910

References

  • https://access.redhat.com/security/updates/classification/#important

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility