-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat Advanced Cluster Management for Kubernetes version 2.3
Advisory ID:       RHSA-2021:3016-01
Product:           Red Hat ACM
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:3016
Issue date:        2021-08-05
CVE Names:         CVE-2016-10228 CVE-2017-14502 CVE-2018-20843 
                   CVE-2018-1000858 CVE-2019-2708 CVE-2019-9169 
                   CVE-2019-13050 CVE-2019-13627 CVE-2019-14889 
                   CVE-2019-15903 CVE-2019-19906 CVE-2019-20454 
                   CVE-2019-20934 CVE-2019-25013 CVE-2020-1730 
                   CVE-2020-8231 CVE-2020-8284 CVE-2020-8285 
                   CVE-2020-8286 CVE-2020-8927 CVE-2020-11668 
                   CVE-2020-13434 CVE-2020-15358 CVE-2020-27618 
                   CVE-2020-28196 CVE-2020-28469 CVE-2020-28500 
                   CVE-2020-28851 CVE-2020-28852 CVE-2020-29361 
                   CVE-2020-29362 CVE-2020-29363 CVE-2021-3326 
                   CVE-2021-3377 CVE-2021-3449 CVE-2021-3450 
                   CVE-2021-3516 CVE-2021-3517 CVE-2021-3518 
                   CVE-2021-3520 CVE-2021-3537 CVE-2021-3541 
                   CVE-2021-3560 CVE-2021-20271 CVE-2021-20305 
                   CVE-2021-21272 CVE-2021-21309 CVE-2021-21321 
                   CVE-2021-21322 CVE-2021-23337 CVE-2021-23343 
                   CVE-2021-23346 CVE-2021-23362 CVE-2021-23364 
                   CVE-2021-23368 CVE-2021-23369 CVE-2021-23382 
                   CVE-2021-23383 CVE-2021-23839 CVE-2021-23840 
                   CVE-2021-23841 CVE-2021-25217 CVE-2021-27219 
                   CVE-2021-27292 CVE-2021-27358 CVE-2021-28092 
                   CVE-2021-28918 CVE-2021-29418 CVE-2021-29477 
                   CVE-2021-29478 CVE-2021-29482 CVE-2021-32399 
                   CVE-2021-33033 CVE-2021-33034 CVE-2021-33502 
                   CVE-2021-33623 CVE-2021-33909 CVE-2021-33910 
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.3.0 General
Availability release images, which fix several bugs and security issues. 

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.3.0 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs and security issues. See
the following Release Notes documentation, which will be updated shortly
for this release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.3/html/release_notes/

Security:

* fastify-reply-from: crafted URL allows prefix scape of the proxied
backend service (CVE-2021-21321)

* fastify-http-proxy: crafted URL allows prefix scape of the proxied
backend service (CVE-2021-21322)

* nodejs-netmask: improper input validation of octal input data
(CVE-2021-28918)

* redis: Integer overflow via STRALGO LCS command (CVE-2021-29477)

* redis: Integer overflow via COPY command for large intsets
(CVE-2021-29478)

* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)

* nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
(CVE-2020-28500)

* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing
- -u- extension (CVE-2020-28851)

* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing
bcp47 tag (CVE-2020-28852)

* nodejs-ansi_up: XSS due to insufficient URL sanitization (CVE-2021-3377)

* oras: zip-slip vulnerability via oras-pull (CVE-2021-21272)

* redis: integer overflow when configurable limit for maximum supported
bulk input size is too big on 32-bit platforms (CVE-2021-21309)

* nodejs-lodash: command injection via template (CVE-2021-23337)

* nodejs-hosted-git-info: Regular Expression denial of service via
shortcutMatch in fromUrl() (CVE-2021-23362)

* browserslist: parsing of invalid queries could result in Regular
Expression Denial of Service (ReDoS) (CVE-2021-23364)

* nodejs-postcss: Regular expression denial of service during source map
parsing (CVE-2021-23368)

* nodejs-handlebars: Remote code execution when compiling untrusted compile
templates with strict:true option (CVE-2021-23369)

* nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in
lib/previous-map.js (CVE-2021-23382)

* nodejs-handlebars: Remote code execution when compiling untrusted compile
templates with compat:true option (CVE-2021-23383)

* openssl: integer overflow in CipherUpdate (CVE-2021-23840)

* openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
(CVE-2021-23841)

* nodejs-ua-parser-js: ReDoS via malicious User-Agent header
(CVE-2021-27292)

* grafana: snapshot feature allow an unauthenticated remote attacker to
trigger a DoS via a remote API call (CVE-2021-27358)

* nodejs-is-svg: ReDoS via malicious string (CVE-2021-28092)

* nodejs-netmask: incorrectly parses an IP address that has octal integer
with invalid character (CVE-2021-29418)

* ulikunitz/xz: Infinite loop in readUvarint allows for denial of service
(CVE-2021-29482)

* normalize-url: ReDoS for data URLs (CVE-2021-33502)

* nodejs-trim-newlines: ReDoS in .end() method (CVE-2021-33623)

* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe
(CVE-2021-23343)

* html-parse-stringify: Regular Expression DoS (CVE-2021-23346)

* openssl: incorrect SSLv2 rollback protection (CVE-2021-23839)

For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
pages listed in the References section.

Bugs:

* RFE Make the source code for the endpoint-metrics-operator public (BZ#
1913444)

* cluster became offline after apiserver health check (BZ# 1942589)

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.3/html-single/install/index#installing

4. Bugs fixed (https://bugzilla.redhat.com/):

1913333 - CVE-2020-28851 golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension
1913338 - CVE-2020-28852 golang.org/x/text: Panic in language.ParseAcceptLanguage while processing bcp47 tag
1913444 - RFE Make the source code for the endpoint-metrics-operator public
1921286 - CVE-2021-21272 oras: zip-slip vulnerability via oras-pull
1927520 - RHACM 2.3.0 images
1928937 - CVE-2021-23337 nodejs-lodash: command injection via template
1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
1930294 - CVE-2021-23839 openssl: incorrect SSLv2 rollback protection
1930310 - CVE-2021-23841 openssl: NULL pointer dereference in X509_issuer_and_serial_hash()
1930324 - CVE-2021-23840 openssl: integer overflow in CipherUpdate
1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms
1936427 - CVE-2021-3377 nodejs-ansi_up: XSS due to insufficient URL sanitization
1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string
1940196 - View Resource YAML option shows 404 error when reviewing a Subscription for an application
1940613 - CVE-2021-27292 nodejs-ua-parser-js: ReDoS via malicious User-Agent header
1941024 - CVE-2021-27358 grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call
1941675 - CVE-2021-23346 html-parse-stringify: Regular Expression DoS
1942178 - CVE-2021-21321 fastify-reply-from: crafted URL allows prefix scape of the proxied backend service
1942182 - CVE-2021-21322 fastify-http-proxy: crafted URL allows prefix scape of the proxied backend service
1942589 - cluster became offline after apiserver health check
1943208 - CVE-2021-23362 nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl()
1944822 - CVE-2021-29418 nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character
1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data
1945459 - CVE-2020-28469 nodejs-glob-parent: Regular expression denial of service
1948761 - CVE-2021-23369 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option
1948763 - CVE-2021-23368 nodejs-postcss: Regular expression denial of service during source map parsing
1954150 - CVE-2021-23382 nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js
1954368 - CVE-2021-29482 ulikunitz/xz: Infinite loop in readUvarint allows for denial of service
1955619 - CVE-2021-23364 browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS)
1956688 - CVE-2021-23383 nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option
1956818 - CVE-2021-23343 nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe
1957410 - CVE-2021-29477 redis: Integer overflow via STRALGO LCS command
1957414 - CVE-2021-29478 redis: Integer overflow via COPY command for large intsets
1964461 - CVE-2021-33502 normalize-url: ReDoS for data URLs
1966615 - CVE-2021-33623 nodejs-trim-newlines: ReDoS in .end() method
1968122 - clusterdeployment fails because hiveadmission sc does not have correct permissions
1972703 - Subctl fails to join cluster, since it cannot auto-generate a valid cluster id
1983131 - Defragmenting an etcd member doesn't reduce the DB size (7.5GB) on a setup with ~1000 spoke clusters

5. References:

https://access.redhat.com/security/cve/CVE-2016-10228
https://access.redhat.com/security/cve/CVE-2017-14502
https://access.redhat.com/security/cve/CVE-2018-20843
https://access.redhat.com/security/cve/CVE-2018-1000858
https://access.redhat.com/security/cve/CVE-2019-2708
https://access.redhat.com/security/cve/CVE-2019-9169
https://access.redhat.com/security/cve/CVE-2019-13050
https://access.redhat.com/security/cve/CVE-2019-13627
https://access.redhat.com/security/cve/CVE-2019-14889
https://access.redhat.com/security/cve/CVE-2019-15903
https://access.redhat.com/security/cve/CVE-2019-19906
https://access.redhat.com/security/cve/CVE-2019-20454
https://access.redhat.com/security/cve/CVE-2019-20934
https://access.redhat.com/security/cve/CVE-2019-25013
https://access.redhat.com/security/cve/CVE-2020-1730
https://access.redhat.com/security/cve/CVE-2020-8231
https://access.redhat.com/security/cve/CVE-2020-8284
https://access.redhat.com/security/cve/CVE-2020-8285
https://access.redhat.com/security/cve/CVE-2020-8286
https://access.redhat.com/security/cve/CVE-2020-8927
https://access.redhat.com/security/cve/CVE-2020-11668
https://access.redhat.com/security/cve/CVE-2020-13434
https://access.redhat.com/security/cve/CVE-2020-15358
https://access.redhat.com/security/cve/CVE-2020-27618
https://access.redhat.com/security/cve/CVE-2020-28196
https://access.redhat.com/security/cve/CVE-2020-28469
https://access.redhat.com/security/cve/CVE-2020-28500
https://access.redhat.com/security/cve/CVE-2020-28851
https://access.redhat.com/security/cve/CVE-2020-28852
https://access.redhat.com/security/cve/CVE-2020-29361
https://access.redhat.com/security/cve/CVE-2020-29362
https://access.redhat.com/security/cve/CVE-2020-29363
https://access.redhat.com/security/cve/CVE-2021-3326
https://access.redhat.com/security/cve/CVE-2021-3377
https://access.redhat.com/security/cve/CVE-2021-3449
https://access.redhat.com/security/cve/CVE-2021-3450
https://access.redhat.com/security/cve/CVE-2021-3516
https://access.redhat.com/security/cve/CVE-2021-3517
https://access.redhat.com/security/cve/CVE-2021-3518
https://access.redhat.com/security/cve/CVE-2021-3520
https://access.redhat.com/security/cve/CVE-2021-3537
https://access.redhat.com/security/cve/CVE-2021-3541
https://access.redhat.com/security/cve/CVE-2021-3560
https://access.redhat.com/security/cve/CVE-2021-20271
https://access.redhat.com/security/cve/CVE-2021-20305
https://access.redhat.com/security/cve/CVE-2021-21272
https://access.redhat.com/security/cve/CVE-2021-21309
https://access.redhat.com/security/cve/CVE-2021-21321
https://access.redhat.com/security/cve/CVE-2021-21322
https://access.redhat.com/security/cve/CVE-2021-23337
https://access.redhat.com/security/cve/CVE-2021-23343
https://access.redhat.com/security/cve/CVE-2021-23346
https://access.redhat.com/security/cve/CVE-2021-23362
https://access.redhat.com/security/cve/CVE-2021-23364
https://access.redhat.com/security/cve/CVE-2021-23368
https://access.redhat.com/security/cve/CVE-2021-23369
https://access.redhat.com/security/cve/CVE-2021-23382
https://access.redhat.com/security/cve/CVE-2021-23383
https://access.redhat.com/security/cve/CVE-2021-23839
https://access.redhat.com/security/cve/CVE-2021-23840
https://access.redhat.com/security/cve/CVE-2021-23841
https://access.redhat.com/security/cve/CVE-2021-25217
https://access.redhat.com/security/cve/CVE-2021-27219
https://access.redhat.com/security/cve/CVE-2021-27292
https://access.redhat.com/security/cve/CVE-2021-27358
https://access.redhat.com/security/cve/CVE-2021-28092
https://access.redhat.com/security/cve/CVE-2021-28918
https://access.redhat.com/security/cve/CVE-2021-29418
https://access.redhat.com/security/cve/CVE-2021-29477
https://access.redhat.com/security/cve/CVE-2021-29478
https://access.redhat.com/security/cve/CVE-2021-29482
https://access.redhat.com/security/cve/CVE-2021-32399
https://access.redhat.com/security/cve/CVE-2021-33033
https://access.redhat.com/security/cve/CVE-2021-33034
https://access.redhat.com/security/cve/CVE-2021-33502
https://access.redhat.com/security/cve/CVE-2021-33623
https://access.redhat.com/security/cve/CVE-2021-33909
https://access.redhat.com/security/cve/CVE-2021-33910
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYQyKDNzjgjWX9erEAQhAWQ//fU2h/y+76CVkExXChhgJ779lC9Ec1f+X
6yw1b2WCHcztbTwyRtZw90dvIA1rNIDBrd83jIwfzsXzxEfGcCTriOmotHKX44+4
w6uPpmPSOBTsXB/yV/kvbPWpUKkahITC2uvjaInzO2zMmUQ2ntNGpvPu7BbFLmL1
oHMVIZaJ+zrPifwPhGqlp3rAkYe6uGobdvwtrOMXw8L5VnJor+35xLjos5k30IlC
4lftpWm9cD4oozdb5hw4A0i8fyAvue4hzpmgPfUJ6bngux8wycYhPGiRJR1HX03T
MSXsWNBtqXNcB7r/GGqen73rr/eyyqsqfJ7+l8Uu7ph5cjk04foZcMqg+rz/1xne
gVPkWcUJT8j7BH2sO8qiMdfYNl3+xNqPI9MtPEI8K/eiwynwETZqsKnEGIyhcTcX
xe08Io2jV3jlnpQO/SBcvpKyzcqhDOuNBH2ozhn7Ka68WIMk2OuWempQcyDlWizO
1UbgoiMVb0hlP0APVpJKNtpfFCjBzFC24gWSAOPTep3vzA418Sn/moCJupM+3PPA
QIzkGAt9f7sffI0JEg0JPEy0/aTmfsPm7XeR6DG+xF7o1nfy1SOcf+tcnPD0K+z8
8fS0uUMB/wO2s5yQ1TctsYzL9S5HRwMtnq7qKwWq9ItYzdQB4pcmyK1WgJAHVAtf
Omk9Hj44tdI=
=X9lR
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce