Lucene search

K
redhatRedHatRHSA-2021:3146
HistoryAug 11, 2021 - 9:12 p.m.

(RHSA-2021:3146) Moderate: ACS 3.64 security and enhancement update

2021-08-1121:12:58
access.redhat.com
262

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

83.2%

New Features
The release of RHACS 3.64 provides the following new features:

  1. You can now use deployment and namespace annotations to define where RHACS sends the violation notifications when configuring your notifiers such as Slack, Microsoft Teams, Email, and others.
  2. The Red Hat Advanced Cluster Security Operator now supports the ability to allow users to set the enforcement behavior of the admission controller as part of their custom resource.
  3. RHACS now supports kernel modules for Ubuntu 16.04 LTS with extended security maintenance (ESM).

Security Fixes
The release of RHACS 3.64 provides the following security fixes:

  • golang: net lookup functions may return invalid hostnames (CVE-2021-33195)
  • golang: net/http/httputil ReverseProxy forwards connection headers if the first one is empty (CVE-2021-33197)
  • golang: math/big.Rat may cause panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)
  • golang: crypto/tls certificate of the wrong type is causing TLS client to panic (CVE-2021-34558)

For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages in the references section.

System changes
The release of RHACS 3.64 includes the following system changes:

  1. RHACS now pre-fixes the optional security context constraint name with stackrox to avoid global naming conflicts.
  2. Previously, violations for port forwards and exec events did not contain information about the user who performed the action that generated the events. The violations now include the user context.
  3. The cluster init bundles contain the secrets required for internal RHACS services to communicate with each other. You can delete these to rotate secrets, which have previously sometimes caused outages. This update includes a new deletion workflow that warns about the possible impact of deletion on your environment.
  4. The OpenShift compliance operator uses rpm only for querying, and it does not install any packages. Therefore, this update includes a policy exception for this pod by default to reduce the violations count.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

83.2%