Lucene search

K
redhatRedHatRHSA-2022:0595
HistoryFeb 22, 2022 - 1:33 p.m.

(RHSA-2022:0595) Important: Red Hat Advanced Cluster Management 2.3.6 security updates and bug fixes

2022-02-2213:33:53
access.redhat.com
83

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

75.6%

Red Hat Advanced Cluster Management for Kubernetes 2.3.6 images

Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which provide some security fixes and bug fixes. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/

Security updates:

  • Nodejs-json-schema: Prototype pollution vulnerability (CVE-2021-3918)

  • Nanoid: Information disclosure via valueOf() function (CVE-2021-23566)

  • Golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)

  • Follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2022-0155)

Bug fixes:

  • Inform ACM policy is not checking properly the node fields (BZ# 2015588)

  • ImagePullPolicy is “Always” for multicluster-operators-subscription-rhel8 image (BZ# 2021128)

  • Traceback blocks reconciliation of helm repository hosted on AWS S3 storage (BZ# 2021576)

  • RHACM 2.3.6 images (BZ# 2029507)

  • Console UI enabled SNO UI Options not displayed during cluster creating (BZ# 2030002)

  • Grc pod restarts for each new GET request to the Governance Policy Page (BZ# 2037351)

  • Clustersets do not appear in UI (BZ# 2049810)

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

75.6%