RedHat: RHSA-2022-5531:01 Moderate: Red Hat Advanced Cluster Manage...

Advisories

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Advanced Cluster Management 2.5.1 security updates and bug fixes
Advisory ID:       RHSA-2022:5531-01
Product:           Red Hat ACM
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:5531
Issue date:        2022-07-07
CVE Names:         CVE-2020-28915 CVE-2021-3695 CVE-2021-3696 
                   CVE-2021-3697 CVE-2021-40528 CVE-2022-1271 
                   CVE-2022-1621 CVE-2022-1629 CVE-2022-22576 
                   CVE-2022-24450 CVE-2022-25313 CVE-2022-25314 
                   CVE-2022-27666 CVE-2022-27774 CVE-2022-27776 
                   CVE-2022-27782 CVE-2022-28733 CVE-2022-28734 
                   CVE-2022-28735 CVE-2022-28736 CVE-2022-28737 
                   CVE-2022-29824 
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General
Availability release images, which fix security issues and bugs.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.5.1 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/

Security update:

* nats-server: misusing the "dynamically provisioned sandbox accounts"
feature authenticated user can obtain the privileges of the System account
(CVE-2022-24450)

Bug fixes:

* Can't install submariner add-ons from UI on unsupported cloud provider
(BZ# 2087686)

* policy controller addons are Progressing status (unhealthy from backend)
on OCP3.11 in ARM hub (BZ# 2088270)

* RHACM 2.5.1 images (BZ# 2090802)

* Broken link to Submariner manual install instructions (BZ# 2095333)

* `The backend service is unavailable` when accessing ACM 2.5 Overview page
(BZ# 2096389)

* 64 character length causing clusters to unsubscribe (BZ# 2101453)

3. Solution:

For Red Hat Advanced Cluster Management for Kubernetes, see the following
documentation, which will be updated shortly for this release, for
important
instructions on installing this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing

4. Bugs fixed (https://bugzilla.redhat.com/):

2052573 - CVE-2022-24450 nats-server: misusing the "dynamically provisioned sandbox accounts" feature  authenticated user can obtain the privileges of the System account
2087686 - Can't install submariner add-ons from UI on unsupported cloud provider
2088270 - policy controller addons are Progressing status (unhealthy from backend)  on OCP3.11 in ARM hub
2090802 - RHACM 2.5.1 images
2095333 - Broken link to Submariner manual install instructions
2096389 - `The backend service is unavailable` when accessing ACM 2.5 Overview page
2101453 - 64 character length causing clusters to unsubscribe

5. References:

https://access.redhat.com/security/cve/CVE-2020-28915
https://access.redhat.com/security/cve/CVE-2021-3695
https://access.redhat.com/security/cve/CVE-2021-3696
https://access.redhat.com/security/cve/CVE-2021-3697
https://access.redhat.com/security/cve/CVE-2021-40528
https://access.redhat.com/security/cve/CVE-2022-1271
https://access.redhat.com/security/cve/CVE-2022-1621
https://access.redhat.com/security/cve/CVE-2022-1629
https://access.redhat.com/security/cve/CVE-2022-22576
https://access.redhat.com/security/cve/CVE-2022-24450
https://access.redhat.com/security/cve/CVE-2022-25313
https://access.redhat.com/security/cve/CVE-2022-25314
https://access.redhat.com/security/cve/CVE-2022-27666
https://access.redhat.com/security/cve/CVE-2022-27774
https://access.redhat.com/security/cve/CVE-2022-27776
https://access.redhat.com/security/cve/CVE-2022-27782
https://access.redhat.com/security/cve/CVE-2022-28733
https://access.redhat.com/security/cve/CVE-2022-28734
https://access.redhat.com/security/cve/CVE-2022-28735
https://access.redhat.com/security/cve/CVE-2022-28736
https://access.redhat.com/security/cve/CVE-2022-28737
https://access.redhat.com/security/cve/CVE-2022-29824
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYuFkcNzjgjWX9erEAQjDyQ/+NnBYxdKnS5ca3caODHe8GRwu1PAreIh1
Y1gZ1mMf8lNt+hWnoNgpRJuhEKHAOLy6PYp3htaBAdhnHSvKCMKEpvpZkxv3Oe1A
tGvAYxgbu7kKHYtnWR0FUEcgTGtgRFEC1e53wybj1JzwyQL8Pr9G4JaAOHzLtPov
9gHw4p/UWa+u/FVIM5+lA7w7yxW8pfmrgxqfN6DJ61vNkiS4fBbKn70pwlY+95Ww
0fDQbm3/+OZ/vp9qUJTMX2VHaH7gFAaseiAMJi1KRCG/Younwgu5JBz/CSSfC+p2
n7odSyK2yGTq81IJ84CVjlYIVqvdsvra6dXOLkxoZ8BLbqkw9RJXKcKcZ11x+uPu
gA6gr873UcPy7ek749Yyt4M86DcfnD/epX0a8fmXVP1y7OQKU/o/VtnJaM5n6vYE
ffmH94aNBRNHaoJe4DtaCuPnVG49Q1YbAjcvbpBFyJieNoI923iuM16+ufAg5fh3
hvEkmIbrxVZpsOJ0TgDpl0uqZq0FryyKhzX/exL+n1NAiPoivNm2QNmghsIxK/cW
/hsgI6tVjLFdythluNz7DUWxJK2amB1KHqJey5U+oP0kA315QHfo35Bze6SXpW3L
IkaDhpm/Pgs8vVQElpwVqUlypBqxoDJMEOs7tXIY6Km7TXM8qV2GD1+xAgolJCYv
oclUMcfx218=
=lDGo
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-5531:01 Moderate: Red Hat Advanced Cluster Management

Red Hat Advanced Cluster Management for Kubernetes 2.5.1 General Availability release images, which fix security issues and bugs

Summary

Red Hat Advanced Cluster Management for Kubernetes 2.5.1 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/
Security update:
* nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account (CVE-2022-24450)
Bug fixes:
* Can't install submariner add-ons from UI on unsupported cloud provider (BZ# 2087686)
* policy controller addons are Progressing status (unhealthy from backend) on OCP3.11 in ARM hub (BZ# 2088270)
* RHACM 2.5.1 images (BZ# 2090802)
* Broken link to Submariner manual install instructions (BZ# 2095333)
* `The backend service is unavailable` when accessing ACM 2.5 Overview page (BZ# 2096389)
* 64 character length causing clusters to unsubscribe (BZ# 2101453)

Solution

For Red Hat Advanced Cluster Management for Kubernetes, see the followingdocumentation, which will be updated shortly for this release, forimportantinstructions on installing this release:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing

References

https://access.redhat.com/security/cve/CVE-2020-28915 https://access.redhat.com/security/cve/CVE-2021-3695 https://access.redhat.com/security/cve/CVE-2021-3696 https://access.redhat.com/security/cve/CVE-2021-3697 https://access.redhat.com/security/cve/CVE-2021-40528 https://access.redhat.com/security/cve/CVE-2022-1271 https://access.redhat.com/security/cve/CVE-2022-1621 https://access.redhat.com/security/cve/CVE-2022-1629 https://access.redhat.com/security/cve/CVE-2022-22576 https://access.redhat.com/security/cve/CVE-2022-24450 https://access.redhat.com/security/cve/CVE-2022-25313 https://access.redhat.com/security/cve/CVE-2022-25314 https://access.redhat.com/security/cve/CVE-2022-27666 https://access.redhat.com/security/cve/CVE-2022-27774 https://access.redhat.com/security/cve/CVE-2022-27776 https://access.redhat.com/security/cve/CVE-2022-27782 https://access.redhat.com/security/cve/CVE-2022-28733 https://access.redhat.com/security/cve/CVE-2022-28734 https://access.redhat.com/security/cve/CVE-2022-28735 https://access.redhat.com/security/cve/CVE-2022-28736 https://access.redhat.com/security/cve/CVE-2022-28737 https://access.redhat.com/security/cve/CVE-2022-29824 https://access.redhat.com/security/updates/classification/#moderate

Package List

Severity
Advisory ID: RHSA-2022:5531-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2022:5531
Issued Date: : 2022-07-07
CVE Names: CVE-2020-28915 CVE-2021-3695 CVE-2021-3696 CVE-2021-3697 CVE-2021-40528 CVE-2022-1271 CVE-2022-1621 CVE-2022-1629 CVE-2022-22576 CVE-2022-24450 CVE-2022-25313 CVE-2022-25314 CVE-2022-27666 CVE-2022-27774 CVE-2022-27776 CVE-2022-27782 CVE-2022-28733 CVE-2022-28734 CVE-2022-28735 CVE-2022-28736 CVE-2022-28737 CVE-2022-29824

Topic

Red Hat Advanced Cluster Management for Kubernetes 2.5.1 GeneralAvailability release images, which fix security issues and bugs.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE links in the References section.

Relevant Releases Architectures

Bugs Fixed

2052573 - CVE-2022-24450 nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account

2087686 - Can't install submariner add-ons from UI on unsupported cloud provider

2088270 - policy controller addons are Progressing status (unhealthy from backend) on OCP3.11 in ARM hub

2090802 - RHACM 2.5.1 images

2095333 - Broken link to Submariner manual install instructions

2096389 - `The backend service is unavailable` when accessing ACM 2.5 Overview page

2101453 - 64 character length causing clusters to unsubscribe

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.