9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.582 Medium
EPSS
Percentile
97.7%
Red Hat Advanced Cluster Management for Kubernetes 2.4.0 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs and security issues. See
the following Release Notes documentation, which will be updated shortly
for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.4/html/release_notes/
Security fixes:
CVE-2021-33623: nodejs-trim-newlines: ReDoS in .end() method
CVE-2021-32626: redis: Lua scripts can overflow the heap-based Lua stack
CVE-2021-32627: redis: Integer overflow issue with Streams
CVE-2021-32628: redis: Integer overflow bug in the ziplist data structure
CVE-2021-32672: redis: Out of bounds read in lua debugger protocol parser
CVE-2021-32675: redis: Denial of service via Redis Standard Protocol (RESP) request
CVE-2021-32687: redis: Integer overflow issue with intsets
CVE-2021-32690: helm: information disclosure vulnerability
CVE-2021-32803: nodejs-tar: Insufficient symlink protection allowing arbitrary file creation and overwrite
CVE-2021-32804: nodejs-tar: Insufficient absolute path sanitization allowing arbitrary file creation and overwrite
CVE-2021-23017: nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
CVE-2021-3711: openssl: SM2 Decryption Buffer Overflow
CVE-2021-3712: openssl: Read buffer overruns processing ASN.1 strings
CVE-2021-3749: nodejs-axios: Regular expression denial of service in trim function
CVE-2021-41099: redis: Integer overflow issue with strings
Bug fixes:
RFE ACM Application management UI doesn’t reflect object status (Bugzilla #1965321)
RHACM 2.4 files (Bugzilla #1983663)
Hive Operator CrashLoopBackOff when deploying ACM with latest downstream 2.4 (Bugzilla #1993366)
submariner-addon pod failing in RHACM 2.4 latest ds snapshot (Bugzilla #1994668)
ACM 2.4 install on OCP 4.9 ipv6 disconnected hub fails due to multicluster pod in clb (Bugzilla #2000274)
pre-network-manager-config failed due to timeout when static config is used (Bugzilla #2003915)
InfraEnv condition does not reflect the actual error message (Bugzilla #2009204, 2010030)
Flaky test point to a nil pointer conditions list (Bugzilla #2010175)
InfraEnv status shows 'Failed to create image: internal error (Bugzilla #2010272)
subctl diagnose firewall intra-cluster - failed VXLAN checks (Bugzilla #2013157)
pre-network-manager-config failed due to timeout when static config is used (Bugzilla #2014084)
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.582 Medium
EPSS
Percentile
97.7%