- Issued:
- 2022-05-03
- Updated:
- 2022-05-03
RHSA-2022:1681 - Security Advisory
Synopsis
Moderate: Red Hat Advanced Cluster Management 2.4.4 security updates and bug fixes
Type/Severity
Security Advisory: Moderate
Topic
Red Hat Advanced Cluster Management for Kubernetes 2.4.4 General
Availability release images. This update provides security fixes, bug fixes, and updates container images.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE links in the References section.
Description
Red Hat Advanced Cluster Management for Kubernetes 2.4.4 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:
Security fixes:
- Vm2: vulnerable to Sandbox Bypass (CVE-2021-23555)
- Golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)
- Follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2022-0155)
- Node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)
- Follow-redirects: Exposure of Sensitive Information via Authorization Header leak (CVE-2022-0536)
- Urijs: Authorization Bypass Through User-Controlled Key (CVE-2022-0613)
- Nconf: Prototype pollution in memory store (CVE-2022-21803)
- Nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account (CVE-2022-24450)
- Urijs: Leading white space bypasses protocol validation (CVE-2022-24723)
- Node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery (CVE-2022-24771)
- Node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery (CVE-2022-24772)
- Node-forge: Signature verification leniency in checking `DigestInfo` structure (CVE-2022-24773)
- Cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2022-1365)
- Moment.js: Path traversal in moment.locale (CVE-2022-24785)
Bug fixes:
- Failed ClusterDeployment validation errors do not surface through the ClusterPool UI (Bugzilla #1995380)
- Agents wrong validation failure on failing to fetch image needed for installation (Bugzilla #2008583)
- Fix catalogsource name (Bugzilla #2038250)
- When the ocp console operator is disable on the managed cluster, the cluster claims failed to update (Bugzilla #2057761)
- Multicluster-operators-hub-subscription OOMKilled (Bugzilla #2053308)
- RHACM 2.4.1 Console becomes unstable and refuses login after one hour (Bugzilla #2061958)
- RHACM 2.4.4 images (Bugzilla #2077548)
Solution
For Red Hat Advanced Cluster Management for Kubernetes, see the following
documentation, which will be updated shortly for this release, for important
instructions on how to upgrade your cluster and fully apply this asynchronous
errata update:
For details on how to apply this update, refer to:
Affected Products
- Red Hat Advanced Cluster Management for Kubernetes 2 for RHEL 8 x86_64
- Red Hat Advanced Cluster Management for Kubernetes 2 for RHEL 7 x86_64
Fixes
- BZ - 1995380 - failed ClusterDeployment validation errors do not surface through the ClusterPool UI
- BZ - 2008583 - Agents wrong validation failure on failing to fetch image needed for installation
- BZ - 2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic
- BZ - 2038250 - Fix catalogsource name
- BZ - 2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor
- BZ - 2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor
- BZ - 2052573 - CVE-2022-24450 nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account
- BZ - 2053259 - CVE-2022-0536 follow-redirects: Exposure of Sensitive Information via Authorization Header leak
- BZ - 2053308 - multicluster-operators-hub-subscription OOMKilled
- BZ - 2054114 - CVE-2021-23555 vm2: vulnerable to Sandbox Bypass
- BZ - 2055496 - CVE-2022-0613 urijs: Authorization Bypass Through User-Controlled Key
- BZ - 2057761 - When the ocp console operator is disable on the managed cluster, the cluster claims failed to update
- BZ - 2058295 - ACM doesn't accept secret type opaque for cluster api certificate
- BZ - 2061958 - RHACM 2.4.1 Console becomes unstable and refuses login after one hour
- BZ - 2062370 - CVE-2022-24723 urijs: Leading white space bypasses protocol validation
- BZ - 2067387 - CVE-2022-24771 node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery
- BZ - 2067458 - CVE-2022-24772 node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery
- BZ - 2067461 - CVE-2022-24773 node-forge: Signature verification leniency in checking `DigestInfo` structure
- BZ - 2072009 - CVE-2022-24785 Moment.js: Path traversal in moment.locale
- BZ - 2074689 - CVE-2022-21803 nconf: Prototype pollution in memory store
- BZ - 2076133 - CVE-2022-1365 cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor
- BZ - 2077548 - RHACM 2.4.4 images
CVEs
References
- https://access.redhat.com/security/updates/classification/#moderate
- https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/index
- https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html-single/install/index#installing
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.