-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Critical: Red Hat Advanced Cluster Management 2.5.2 security fixes and bug fixes
Advisory ID:       RHSA-2022:6507-01
Product:           Red Hat ACM
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:6507
Issue date:        2022-09-13
CVE Names:         CVE-2022-1012 CVE-2022-1292 CVE-2022-1586 
                   CVE-2022-1785 CVE-2022-1897 CVE-2022-1927 
                   CVE-2022-2068 CVE-2022-2097 CVE-2022-2526 
                   CVE-2022-29154 CVE-2022-31129 CVE-2022-32206 
                   CVE-2022-32208 CVE-2022-32250 CVE-2022-36067 
====================================================================
1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.5.2 General
Availability release images, which fix security issues and bugs.

Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.5.2 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/

Security fixes:

* moment: inefficient parsing algorithim resulting in DoS (CVE-2022-31129)
* vm2: Sandbox Escape in vm2 (CVE-2022-36067)

Bug fixes:

* Submariner Globalnet e2e tests failed on MTU between On-Prem to Public
clusters (BZ# 2074547)

* OCP 4.11 - Install fails because of: pods
"management-ingress-63029-5cf6789dd6-" is forbidden: unable to validate
against any security context constrain (BZ# 2082254)

* subctl gather fails to gather libreswan data if CableDriver field is
missing/empty in Submariner Spec (BZ# 2083659)

* Yaml editor for creating vSphere cluster moves to next line after typing
(BZ# 2086883)

* Submariner addon status doesn't track all deployment failures (BZ#
2090311)

* Unable to deploy Hypershift operator on MCE hub using ManagedClusterAddOn
without including s3 secret (BZ# 2091170)

* After switching to ACM 2.5 the managed clusters log "unable to create
ClusterClaim" errors (BZ# 2095481)

* Enforce failed and report the violation after modified memory value in
limitrange policy (BZ# 2100036)

* Creating an application fails with "This application has no subscription
match selector (spec.selector.matchExpressions)" (BZ# 2101577)

* Inconsistent cluster resource statuses between "All Subscription"
topology and individual topologies (BZ# 2102273)

* managed cluster is in "unknown" state for 120 mins after OADP restore

* RHACM 2.5.2 images (BZ# 2104553)

* Subscription UI does not allow binding to label with empty value (BZ#
2104961)

* Upgrade to 2.5.1 from 2.5.0 fails due to missing Subscription CRD (BZ#
2106069)

* Region information is not available for Azure cloud in managedcluster CR
(BZ# 2107134)

* cluster uninstall log points to incorrect container name (BZ# 2107359)

* ACM shows wrong path for Argo CD applicationset git generator (BZ#
2107885)

* Single node checkbox not visible for 4.11 images (BZ# 2109134)

* Unable to deploy hypershift cluster when enabling
validate-cluster-security (BZ# 2109544)

* Deletion of Application (including app related resources) from the
console fails to delete PlacementRule for the application (BZ# 20110026)

* After the creation by a policy of job or deployment (in case the object
is missing)ACM is trying to add new containers instead of updating (BZ#
2117728)

* pods in CrashLoopBackoff on 3.11 managed cluster (BZ# 2122292)

* ArgoCD and AppSet Applications do not deploy to local-cluster (BZ#
2124707)

3. Solution:

For Red Hat Advanced Cluster Management for Kubernetes, see the following
documentation, which will be updated shortly for this release, for
important
instructions about installing this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing

4. Bugs fixed (https://bugzilla.redhat.com/):

2074547 - Submariner Globalnet e2e tests failed on MTU between On-Prem to Public clusters2082254 - OCP 4.11 - Install fails because of: pods "management-ingress-63029-5cf6789dd6-" is forbidden: unable to validate against any security context constraint
2083659 - subctl gather fails to gather libreswan data if CableDriver field is missing/empty in Submariner Spec
2086883 - Yaml editor for creating vSphere cluster moves to next line after typing
2090311 - Submariner addon status doesn't track all deployment failures
2091170 - Unable to deploy Hypershift operator on MCE hub using ManagedClusterAddOn without including s3 secret
2095481 - After switching to ACM 2.5 the managed clusters log "unable to create ClusterClaim" errors2100036 - Enforce failed and report the violation after modified memory value in limitrange policy
2101577 - Creating an application fails with "This application has no subscription match selector (spec.selector.matchExpressions)"
2102273 - Inconsistent cluster resource statuses between "All Subscription" topology and individual topologies
2103653 - managed cluster is in "unknown" state for 120 mins after OADP restore
2104553 - RHACM 2.5.2 images
2104961 - Subscription UI does not allow binding to label with empty value
2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS
2106069 - Upgrade to 2.5.1 from 2.5.0 fails due to missing Subscription CRD
2107134 - Region information is not available for Azure cloud in managedcluster CR
2107359 - cluster uninstall log points to incorrect container name
2107885 - ACM shows wrong path for Argo CD applicationset git generator
2109134 - Single node checkbox not visible for 4.11 images
2110026 - Deletion of Application (including app related resources) from the console fails to delete PlacementRule for the application
2117728 - After the creation by a policy of job or deployment (in case the object is missing)ACM is trying to add new containers instead of updating
2122292 - pods in CrashLoopBackoff on 3.11 managed cluster
2124707 - ArgoCD and AppSet Applications do not deploy to local-cluster
2124794 - CVE-2022-36067 vm2:  Sandbox Escape in vm2

5. References:

https://access.redhat.com/security/cve/CVE-2022-1012
https://access.redhat.com/security/cve/CVE-2022-1292
https://access.redhat.com/security/cve/CVE-2022-1586
https://access.redhat.com/security/cve/CVE-2022-1785
https://access.redhat.com/security/cve/CVE-2022-1897
https://access.redhat.com/security/cve/CVE-2022-1927
https://access.redhat.com/security/cve/CVE-2022-2068
https://access.redhat.com/security/cve/CVE-2022-2097
https://access.redhat.com/security/cve/CVE-2022-2526
https://access.redhat.com/security/cve/CVE-2022-29154
https://access.redhat.com/security/cve/CVE-2022-31129
https://access.redhat.com/security/cve/CVE-2022-32206
https://access.redhat.com/security/cve/CVE-2022-32208
https://access.redhat.com/security/cve/CVE-2022-32250
https://access.redhat.com/security/cve/CVE-2022-36067
https://access.redhat.com/security/updates/classification/#critical

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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y1WG
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-6507:01 Critical: Red Hat Advanced Cluster Management

Red Hat Advanced Cluster Management for Kubernetes 2.5.2 General Availability release images, which fix security issues and bugs

Summary

Red Hat Advanced Cluster Management for Kubernetes 2.5.2 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/
Security fixes:
* moment: inefficient parsing algorithim resulting in DoS (CVE-2022-31129) * vm2: Sandbox Escape in vm2 (CVE-2022-36067)
Bug fixes:
* Submariner Globalnet e2e tests failed on MTU between On-Prem to Public clusters (BZ# 2074547)
* OCP 4.11 - Install fails because of: pods "management-ingress-63029-5cf6789dd6-" is forbidden: unable to validate against any security context constrain (BZ# 2082254)
* subctl gather fails to gather libreswan data if CableDriver field is missing/empty in Submariner Spec (BZ# 2083659)
* Yaml editor for creating vSphere cluster moves to next line after typing (BZ# 2086883)
* Submariner addon status doesn't track all deployment failures (BZ# 2090311)
* Unable to deploy Hypershift operator on MCE hub using ManagedClusterAddOn without including s3 secret (BZ# 2091170)
* After switching to ACM 2.5 the managed clusters log "unable to create ClusterClaim" errors (BZ# 2095481)
* Enforce failed and report the violation after modified memory value in limitrange policy (BZ# 2100036)
* Creating an application fails with "This application has no subscription match selector (spec.selector.matchExpressions)" (BZ# 2101577)
* Inconsistent cluster resource statuses between "All Subscription" topology and individual topologies (BZ# 2102273)
* managed cluster is in "unknown" state for 120 mins after OADP restore
* RHACM 2.5.2 images (BZ# 2104553)
* Subscription UI does not allow binding to label with empty value (BZ# 2104961)
* Upgrade to 2.5.1 from 2.5.0 fails due to missing Subscription CRD (BZ# 2106069)
* Region information is not available for Azure cloud in managedcluster CR (BZ# 2107134)
* cluster uninstall log points to incorrect container name (BZ# 2107359)
* ACM shows wrong path for Argo CD applicationset git generator (BZ# 2107885)
* Single node checkbox not visible for 4.11 images (BZ# 2109134)
* Unable to deploy hypershift cluster when enabling validate-cluster-security (BZ# 2109544)
* Deletion of Application (including app related resources) from the console fails to delete PlacementRule for the application (BZ# 20110026)
* After the creation by a policy of job or deployment (in case the object is missing)ACM is trying to add new containers instead of updating (BZ# 2117728)
* pods in CrashLoopBackoff on 3.11 managed cluster (BZ# 2122292)
* ArgoCD and AppSet Applications do not deploy to local-cluster (BZ# 2124707)



Summary


Solution

For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions about installing this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing

References

https://access.redhat.com/security/cve/CVE-2022-1012 https://access.redhat.com/security/cve/CVE-2022-1292 https://access.redhat.com/security/cve/CVE-2022-1586 https://access.redhat.com/security/cve/CVE-2022-1785 https://access.redhat.com/security/cve/CVE-2022-1897 https://access.redhat.com/security/cve/CVE-2022-1927 https://access.redhat.com/security/cve/CVE-2022-2068 https://access.redhat.com/security/cve/CVE-2022-2097 https://access.redhat.com/security/cve/CVE-2022-2526 https://access.redhat.com/security/cve/CVE-2022-29154 https://access.redhat.com/security/cve/CVE-2022-31129 https://access.redhat.com/security/cve/CVE-2022-32206 https://access.redhat.com/security/cve/CVE-2022-32208 https://access.redhat.com/security/cve/CVE-2022-32250 https://access.redhat.com/security/cve/CVE-2022-36067 https://access.redhat.com/security/updates/classification/#critical

Package List


Severity
Advisory ID: RHSA-2022:6507-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2022:6507
Issued Date: : 2022-09-13
CVE Names: CVE-2022-1012 CVE-2022-1292 CVE-2022-1586 CVE-2022-1785 CVE-2022-1897 CVE-2022-1927 CVE-2022-2068 CVE-2022-2097 CVE-2022-2526 CVE-2022-29154 CVE-2022-31129 CVE-2022-32206 CVE-2022-32208 CVE-2022-32250 CVE-2022-36067

Topic

Red Hat Advanced Cluster Management for Kubernetes 2.5.2 GeneralAvailability release images, which fix security issues and bugs.Red Hat Product Security has rated this update as having a security impactof Critical. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE links in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2074547 - Submariner Globalnet e2e tests failed on MTU between On-Prem to Public clusters2082254 - OCP 4.11 - Install fails because of: pods "management-ingress-63029-5cf6789dd6-" is forbidden: unable to validate against any security context constraint

2083659 - subctl gather fails to gather libreswan data if CableDriver field is missing/empty in Submariner Spec

2086883 - Yaml editor for creating vSphere cluster moves to next line after typing

2090311 - Submariner addon status doesn't track all deployment failures

2091170 - Unable to deploy Hypershift operator on MCE hub using ManagedClusterAddOn without including s3 secret

2095481 - After switching to ACM 2.5 the managed clusters log "unable to create ClusterClaim" errors2100036 - Enforce failed and report the violation after modified memory value in limitrange policy

2101577 - Creating an application fails with "This application has no subscription match selector (spec.selector.matchExpressions)"

2102273 - Inconsistent cluster resource statuses between "All Subscription" topology and individual topologies

2103653 - managed cluster is in "unknown" state for 120 mins after OADP restore

2104553 - RHACM 2.5.2 images

2104961 - Subscription UI does not allow binding to label with empty value

2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS

2106069 - Upgrade to 2.5.1 from 2.5.0 fails due to missing Subscription CRD

2107134 - Region information is not available for Azure cloud in managedcluster CR

2107359 - cluster uninstall log points to incorrect container name

2107885 - ACM shows wrong path for Argo CD applicationset git generator

2109134 - Single node checkbox not visible for 4.11 images

2110026 - Deletion of Application (including app related resources) from the console fails to delete PlacementRule for the application

2117728 - After the creation by a policy of job or deployment (in case the object is missing)ACM is trying to add new containers instead of updating

2122292 - pods in CrashLoopBackoff on 3.11 managed cluster

2124707 - ArgoCD and AppSet Applications do not deploy to local-cluster

2124794 - CVE-2022-36067 vm2: Sandbox Escape in vm2


Related News