10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.609 Medium
EPSS
Percentile
97.7%
Red Hat Advanced Cluster Management for Kubernetes 2.3.0 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs and security issues. See
the following Release Notes documentation, which will be updated shortly
for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.3/html/release_notes/
Security:
fastify-reply-from: crafted URL allows prefix scape of the proxied backend service (CVE-2021-21321)
fastify-http-proxy: crafted URL allows prefix scape of the proxied
backend service (CVE-2021-21322)
nodejs-netmask: improper input validation of octal input data (CVE-2021-28918)
redis: Integer overflow via STRALGO LCS command (CVE-2021-29477)
redis: Integer overflow via COPY command for large intsets (CVE-2021-29478)
nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)
nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
(CVE-2020-28500)
golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)
golang.org/x/text: Panic in language.ParseAcceptLanguage while processing
bcp47 tag (CVE-2020-28852)
nodejs-ansi_up: XSS due to insufficient URL sanitization (CVE-2021-3377)
oras: zip-slip vulnerability via oras-pull (CVE-2021-21272)
redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms (CVE-2021-21309)
nodejs-lodash: command injection via template (CVE-2021-23337)
nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362)
browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS) (CVE-2021-23364)
nodejs-postcss: Regular expression denial of service during source map parsing (CVE-2021-23368)
nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option (CVE-2021-23369)
nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js (CVE-2021-23382)
nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option (CVE-2021-23383)
openssl: integer overflow in CipherUpdate (CVE-2021-23840)
openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
(CVE-2021-23841)
nodejs-ua-parser-js: ReDoS via malicious User-Agent header (CVE-2021-27292)
grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call (CVE-2021-27358)
nodejs-is-svg: ReDoS via malicious string (CVE-2021-28092)
nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character (CVE-2021-29418)
ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)
normalize-url: ReDoS for data URLs (CVE-2021-33502)
nodejs-trim-newlines: ReDoS in .end() method (CVE-2021-33623)
nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)
html-parse-stringify: Regular Expression DoS (CVE-2021-23346)
openssl: incorrect SSLv2 rollback protection (CVE-2021-23839)
For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
pages listed in the References section.
Bugs:
RFE Make the source code for the endpoint-metrics-operator public (BZ# 1913444)
cluster became offline after apiserver health check (BZ# 1942589)
10 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.609 Medium
EPSS
Percentile
97.7%