-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Advanced Cluster Management 2.4.4 security updates and bug fixes
Advisory ID:       RHSA-2022:1681-01
Product:           Red Hat ACM
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:1681
Issue date:        2022-05-03
CVE Names:         CVE-2018-25032 CVE-2021-4028 CVE-2021-4115 
                   CVE-2021-23555 CVE-2021-43565 CVE-2022-0155 
                   CVE-2022-0235 CVE-2022-0536 CVE-2022-0613 
                   CVE-2022-1154 CVE-2022-1271 CVE-2022-1365 
                   CVE-2022-21803 CVE-2022-24450 CVE-2022-24723 
                   CVE-2022-24771 CVE-2022-24772 CVE-2022-24773 
                   CVE-2022-24785 CVE-2022-25636 
====================================================================
1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.4.4 General
Availability release images. This update provides security fixes, bug
fixes, and updates container images.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE links in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.4.4 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/

Security fixes:

* Vm2: vulnerable to Sandbox Bypass (CVE-2021-23555)

* Golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)

* Follow-redirects: Exposure of Private Personal Information to an
Unauthorized Actor (CVE-2022-0155)

* Node-fetch: exposure of sensitive information to an unauthorized actor
(CVE-2022-0235)

* Follow-redirects: Exposure of Sensitive Information via Authorization
Header leak (CVE-2022-0536)

* Urijs: Authorization Bypass Through User-Controlled Key (CVE-2022-0613)

* Nconf: Prototype pollution in memory store (CVE-2022-21803)

* Nats-server: misusing the "dynamically provisioned sandbox accounts"
feature authenticated user can obtain the privileges of the System account
(CVE-2022-24450)

* Urijs: Leading white space bypasses protocol validation (CVE-2022-24723)

* Node-forge: Signature verification leniency in checking `digestAlgorithm`
structure can lead to signature forgery (CVE-2022-24771)

* Node-forge: Signature verification failing to check tailing garbage bytes
can lead to signature forgery (CVE-2022-24772)

* Node-forge: Signature verification leniency in checking `DigestInfo`
structure (CVE-2022-24773)

* Cross-fetch: Exposure of Private Personal Information to an Unauthorized
Actor (CVE-2022-1365)

* Moment.js: Path traversal in moment.locale (CVE-2022-24785)

Bug fixes:

* Failed ClusterDeployment validation errors do not surface through the
ClusterPool UI (Bugzilla #1995380)

* Agents wrong validation failure on failing to fetch image needed for
installation (Bugzilla #2008583)

* Fix catalogsource name (Bugzilla #2038250)

* When the ocp console operator is disable on the managed cluster, the
cluster claims failed to update (Bugzilla #2057761)

* Multicluster-operators-hub-subscription OOMKilled (Bugzilla #2053308)

* RHACM 2.4.1 Console becomes unstable and refuses login after one hour
(Bugzilla #2061958)

* RHACM 2.4.4 images (Bugzilla #2077548)

3. Solution:

For Red Hat Advanced Cluster Management for Kubernetes, see the following
documentation, which will be updated shortly for this release, for
important
instructions on how to upgrade your cluster and fully apply this
asynchronous
errata update:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index

For details on how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing

4. Bugs fixed (https://bugzilla.redhat.com/):

1995380 - failed ClusterDeployment validation errors do not surface through the ClusterPool UI
2008583 - Agents wrong validation failure on failing to fetch image needed for installation
2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic
2038250 - Fix catalogsource name
2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor
2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor
2052573 - CVE-2022-24450 nats-server: misusing the "dynamically provisioned sandbox accounts" feature  authenticated user can obtain the privileges of the System account
2053259 - CVE-2022-0536 follow-redirects: Exposure of Sensitive Information via Authorization Header leak
2053308 - multicluster-operators-hub-subscription OOMKilled
2054114 - CVE-2021-23555 vm2: vulnerable to Sandbox Bypass
2055496 - CVE-2022-0613 urijs: Authorization Bypass Through User-Controlled Key
2057761 - When the ocp console operator is disable on the managed cluster, the cluster claims failed to update
2058295 - ACM doesn't accept secret type opaque for cluster api certificate
2061958 - RHACM 2.4.1 Console becomes unstable and refuses login after one hour
2062370 - CVE-2022-24723 urijs: Leading white space bypasses protocol validation
2067387 - CVE-2022-24771 node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery
2067458 - CVE-2022-24772 node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery
2067461 - CVE-2022-24773 node-forge: Signature verification leniency in checking `DigestInfo` structure
2072009 - CVE-2022-24785 Moment.js: Path traversal  in moment.locale
2074689 - CVE-2022-21803 nconf: Prototype pollution in memory store
2076133 - CVE-2022-1365 cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor
2077548 - RHACM 2.4.4 images

5. References:

https://access.redhat.com/security/cve/CVE-2018-25032
https://access.redhat.com/security/cve/CVE-2021-4028
https://access.redhat.com/security/cve/CVE-2021-4115
https://access.redhat.com/security/cve/CVE-2021-23555
https://access.redhat.com/security/cve/CVE-2021-43565
https://access.redhat.com/security/cve/CVE-2022-0155
https://access.redhat.com/security/cve/CVE-2022-0235
https://access.redhat.com/security/cve/CVE-2022-0536
https://access.redhat.com/security/cve/CVE-2022-0613
https://access.redhat.com/security/cve/CVE-2022-1154
https://access.redhat.com/security/cve/CVE-2022-1271
https://access.redhat.com/security/cve/CVE-2022-1365
https://access.redhat.com/security/cve/CVE-2022-21803
https://access.redhat.com/security/cve/CVE-2022-24450
https://access.redhat.com/security/cve/CVE-2022-24723
https://access.redhat.com/security/cve/CVE-2022-24771
https://access.redhat.com/security/cve/CVE-2022-24772
https://access.redhat.com/security/cve/CVE-2022-24773
https://access.redhat.com/security/cve/CVE-2022-24785
https://access.redhat.com/security/cve/CVE-2022-25636
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/index
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html-single/install/index#installing

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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9gmD
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-1681:01 Moderate: Red Hat Advanced Cluster Management

Red Hat Advanced Cluster Management for Kubernetes 2.4.4 General Availability release images

Summary

Red Hat Advanced Cluster Management for Kubernetes 2.4.4 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/
Security fixes:
* Vm2: vulnerable to Sandbox Bypass (CVE-2021-23555)
* Golang.org/x/crypto: empty plaintext packet causes panic (CVE-2021-43565)
* Follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2022-0155)
* Node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)
* Follow-redirects: Exposure of Sensitive Information via Authorization Header leak (CVE-2022-0536)
* Urijs: Authorization Bypass Through User-Controlled Key (CVE-2022-0613)
* Nconf: Prototype pollution in memory store (CVE-2022-21803)
* Nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account (CVE-2022-24450)
* Urijs: Leading white space bypasses protocol validation (CVE-2022-24723)
* Node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery (CVE-2022-24771)
* Node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery (CVE-2022-24772)
* Node-forge: Signature verification leniency in checking `DigestInfo` structure (CVE-2022-24773)
* Cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor (CVE-2022-1365)
* Moment.js: Path traversal in moment.locale (CVE-2022-24785)
Bug fixes:
* Failed ClusterDeployment validation errors do not surface through the ClusterPool UI (Bugzilla #1995380)
* Agents wrong validation failure on failing to fetch image needed for installation (Bugzilla #2008583)
* Fix catalogsource name (Bugzilla #2038250)
* When the ocp console operator is disable on the managed cluster, the cluster claims failed to update (Bugzilla #2057761)
* Multicluster-operators-hub-subscription OOMKilled (Bugzilla #2053308)
* RHACM 2.4.1 Console becomes unstable and refuses login after one hour (Bugzilla #2061958)
* RHACM 2.4.4 images (Bugzilla #2077548)



Summary


Solution

For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/index
For details on how to apply this update, refer to:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing

References

https://access.redhat.com/security/cve/CVE-2018-25032 https://access.redhat.com/security/cve/CVE-2021-4028 https://access.redhat.com/security/cve/CVE-2021-4115 https://access.redhat.com/security/cve/CVE-2021-23555 https://access.redhat.com/security/cve/CVE-2021-43565 https://access.redhat.com/security/cve/CVE-2022-0155 https://access.redhat.com/security/cve/CVE-2022-0235 https://access.redhat.com/security/cve/CVE-2022-0536 https://access.redhat.com/security/cve/CVE-2022-0613 https://access.redhat.com/security/cve/CVE-2022-1154 https://access.redhat.com/security/cve/CVE-2022-1271 https://access.redhat.com/security/cve/CVE-2022-1365 https://access.redhat.com/security/cve/CVE-2022-21803 https://access.redhat.com/security/cve/CVE-2022-24450 https://access.redhat.com/security/cve/CVE-2022-24723 https://access.redhat.com/security/cve/CVE-2022-24771 https://access.redhat.com/security/cve/CVE-2022-24772 https://access.redhat.com/security/cve/CVE-2022-24773 https://access.redhat.com/security/cve/CVE-2022-24785 https://access.redhat.com/security/cve/CVE-2022-25636 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/index https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html-single/install/index#installing

Package List


Severity
Advisory ID: RHSA-2022:1681-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2022:1681
Issued Date: : 2022-05-03
CVE Names: CVE-2018-25032 CVE-2021-4028 CVE-2021-4115 CVE-2021-23555 CVE-2021-43565 CVE-2022-0155 CVE-2022-0235 CVE-2022-0536 CVE-2022-0613 CVE-2022-1154 CVE-2022-1271 CVE-2022-1365 CVE-2022-21803 CVE-2022-24450 CVE-2022-24723 CVE-2022-24771 CVE-2022-24772 CVE-2022-24773 CVE-2022-24785 CVE-2022-25636

Topic

Red Hat Advanced Cluster Management for Kubernetes 2.4.4 GeneralAvailability release images. This update provides security fixes, bugfixes, and updates container images.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE links in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

1995380 - failed ClusterDeployment validation errors do not surface through the ClusterPool UI

2008583 - Agents wrong validation failure on failing to fetch image needed for installation

2030787 - CVE-2021-43565 golang.org/x/crypto: empty plaintext packet causes panic

2038250 - Fix catalogsource name

2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor

2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor

2052573 - CVE-2022-24450 nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account

2053259 - CVE-2022-0536 follow-redirects: Exposure of Sensitive Information via Authorization Header leak

2053308 - multicluster-operators-hub-subscription OOMKilled

2054114 - CVE-2021-23555 vm2: vulnerable to Sandbox Bypass

2055496 - CVE-2022-0613 urijs: Authorization Bypass Through User-Controlled Key

2057761 - When the ocp console operator is disable on the managed cluster, the cluster claims failed to update

2058295 - ACM doesn't accept secret type opaque for cluster api certificate

2061958 - RHACM 2.4.1 Console becomes unstable and refuses login after one hour

2062370 - CVE-2022-24723 urijs: Leading white space bypasses protocol validation

2067387 - CVE-2022-24771 node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery

2067458 - CVE-2022-24772 node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery

2067461 - CVE-2022-24773 node-forge: Signature verification leniency in checking `DigestInfo` structure

2072009 - CVE-2022-24785 Moment.js: Path traversal in moment.locale

2074689 - CVE-2022-21803 nconf: Prototype pollution in memory store

2076133 - CVE-2022-1365 cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor

2077548 - RHACM 2.4.4 images


Related News