-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat Advanced Cluster Management 2.1.12 security fixes and container updates
Advisory ID:       RHSA-2021:3949-01
Product:           Red Hat ACM
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:3949
Issue date:        2021-10-20
CVE Names:         CVE-2016-4658 CVE-2021-3653 CVE-2021-3656 
                   CVE-2021-22543 CVE-2021-22922 CVE-2021-22923 
                   CVE-2021-22924 CVE-2021-23840 CVE-2021-23841 
                   CVE-2021-32626 CVE-2021-32627 CVE-2021-32628 
                   CVE-2021-32672 CVE-2021-32675 CVE-2021-32687 
                   CVE-2021-36222 CVE-2021-37576 CVE-2021-37750 
                   CVE-2021-41099 
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.1.12 General
Availability release images, which provide security fixes and update the
container images.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.1.12 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains updates to one or more container images for Red Hat
Advanced Cluster Management for Kubernetes. See the following Release Notes
documentation, which will be updated shortly for this release, for
additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.1/html/release_notes/

Security fixes:

* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)

* redis: Integer overflow issue with Streams (CVE-2021-32627)

* redis: Integer overflow bug in the ziplist data structure
(CVE-2021-32628)

* redis: Integer overflow issue with intsets (CVE-2021-32687)

* redis: Integer overflow issue with strings (CVE-2021-41099)

* redis: Denial of service via Redis Standard Protocol (RESP) request
(CVE-2021-32675)

* redis: Out of bounds read in lua debugger protocol parser
(CVE-2021-32672)

For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Container updates:

* RHACM 2.1.12 images (BZ# 2007489)

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

*Important:* This upgrade of Red Hat Advanced Cluster Management for
Kubernetes 
is not supported when you are running Red Hat Advanced Cluster Management
on 
Red Hat OpenShift Container Platform version 4.5. To apply this upgrade,
you 
must upgrade your OpenShift Container Platform version to 4.6, or later. 

For details on how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.1/html/install/installing#upgrading-by-using-the-op
erator

4. Bugs fixed (https://bugzilla.redhat.com/):

2007489 - RHACM 2.1.12 images
2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets
2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request
2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser
2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure
2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams
2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack
2011020 - CVE-2021-41099 redis: Integer overflow issue with strings

5. References:

https://access.redhat.com/security/cve/CVE-2016-4658
https://access.redhat.com/security/cve/CVE-2021-3653
https://access.redhat.com/security/cve/CVE-2021-3656
https://access.redhat.com/security/cve/CVE-2021-22543
https://access.redhat.com/security/cve/CVE-2021-22922
https://access.redhat.com/security/cve/CVE-2021-22923
https://access.redhat.com/security/cve/CVE-2021-22924
https://access.redhat.com/security/cve/CVE-2021-23840
https://access.redhat.com/security/cve/CVE-2021-23841
https://access.redhat.com/security/cve/CVE-2021-32626
https://access.redhat.com/security/cve/CVE-2021-32627
https://access.redhat.com/security/cve/CVE-2021-32628
https://access.redhat.com/security/cve/CVE-2021-32672
https://access.redhat.com/security/cve/CVE-2021-32675
https://access.redhat.com/security/cve/CVE-2021-32687
https://access.redhat.com/security/cve/CVE-2021-36222
https://access.redhat.com/security/cve/CVE-2021-37576
https://access.redhat.com/security/cve/CVE-2021-37750
https://access.redhat.com/security/cve/CVE-2021-41099
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=siEM
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce