- Issued:
- 2022-09-26
- Updated:
- 2022-09-26
RHSA-2022:6696 - Security Advisory
Synopsis
Critical: Red Hat Advanced Cluster Management 2.4.6 security update and bug fixes
Type/Severity
Security Advisory: Critical
Topic
Red Hat Advanced Cluster Management for Kubernetes 2.4.6 General
Availability release images, which fix bugs and update container images.
Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Description
Red Hat Advanced Cluster Management for Kubernetes 2.4.6 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several security issues and several bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:
Security fixes:
- golang: crypto/tls: session tickets lack random ticket_age_add (CVE-2022-30629)
- moment: inefficient parsing algorithim resulting in DoS (CVE-2022-31129)
- nodejs16: CRLF injection in node-undici (CVE-2022-31150)
- nodejs/undici: Cookie headers uncleared on cross-origin redirect (CVE-2022-31151)
- vm2: Sandbox Escape in vm2 (CVE-2022-36067)
Bug fixes:
- RHACM 2.4 using deprecated APIs in managed clusters (BZ# 2041540)
- vSphere network name doesn't allow entering spaces and doesn't reflect YAML changes (BZ# 2074766)
- cluster update status is stuck, also update is not even visible (BZ# 2079418)
- Policy that creates cluster role is showing as not compliant due to Request entity too large message (BZ# 2088486)
- Upgraded from RHACM 2.2-->2.3-->2.4 and cannot create cluster (BZ# 2089490)
- ACM Console Becomes Unusable After a Time (BZ# 2097464)
- RHACM 2.4.6 images (BZ# 2100613)
- Cluster Pools with conflicting name of existing clusters in same namespace fails creation and deletes existing cluster (BZ# 2102436)
- ManagedClusters in Pending import state after ACM hub migration (BZ# 2102495)
Solution
For Red Hat Advanced Cluster Management for Kubernetes, see the following
documentation, which will be updated shortly for this release, for important
instructions on installing this update:
Affected Products
- Red Hat Advanced Cluster Management for Kubernetes 2 for RHEL 8 x86_64
- Red Hat Advanced Cluster Management for Kubernetes 2 for RHEL 7 x86_64
Fixes
- BZ - 2041540 - RHACM 2.4 using deprecated APIs in managed clusters
- BZ - 2074766 - vSphere network name doesn't allow entering spaces and doesn't reflect YAML changes
- BZ - 2079418 - cluster update status is stuck, also update is not even visible
- BZ - 2088486 - Policy that creates cluster role is showing as not compliant due to Request entity too large message
- BZ - 2089490 - Upgraded from RHACM 2.2-->2.3-->2.4 and cannot create cluster
- BZ - 2092793 - CVE-2022-30629 golang: crypto/tls: session tickets lack random ticket_age_add
- BZ - 2097464 - ACM Console Becomes Unusable After a Time
- BZ - 2100613 - RHACM 2.4.6 images
- BZ - 2102436 - Cluster Pools with conflicting name of existing clusters in same namespace fails creation and deletes existing cluster
- BZ - 2102495 - ManagedClusters in Pending import state after ACM hub migration
- BZ - 2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS
- BZ - 2109354 - CVE-2022-31150 nodejs16: CRLF injection in node-undici
- BZ - 2121396 - CVE-2022-31151 nodejs/undici: Cookie headers uncleared on cross-origin redirect
- BZ - 2124794 - CVE-2022-36067 vm2: Sandbox Escape in vm2
CVEs
- CVE-2015-20107
- CVE-2021-40528
- CVE-2022-0391
- CVE-2022-1292
- CVE-2022-1586
- CVE-2022-1785
- CVE-2022-1897
- CVE-2022-1927
- CVE-2022-2068
- CVE-2022-2097
- CVE-2022-2526
- CVE-2022-21123
- CVE-2022-21125
- CVE-2022-21166
- CVE-2022-25313
- CVE-2022-25314
- CVE-2022-29154
- CVE-2022-29824
- CVE-2022-30629
- CVE-2022-31129
- CVE-2022-31150
- CVE-2022-31151
- CVE-2022-32206
- CVE-2022-32208
- CVE-2022-34903
- CVE-2022-36067
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.