RedHat: RHSA-2022-7276:01 Moderate: Red Hat Advanced Cluster Manage...
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Advanced Cluster Management 2.4.8 security fixes and container updates
Advisory ID:       RHSA-2022:7276-01
Product:           Red Hat ACM
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:7276
Issue date:        2022-11-01
CVE Names:         CVE-2020-35525 CVE-2020-35527 CVE-2022-0494 
                   CVE-2022-1353 CVE-2022-2238 CVE-2022-2509 
                   CVE-2022-2588 CVE-2022-3515 CVE-2022-23816 
                   CVE-2022-23825 CVE-2022-25858 CVE-2022-29900 
                   CVE-2022-29901 CVE-2022-31129 CVE-2022-34903 
                   CVE-2022-35948 CVE-2022-35949 CVE-2022-37434 
                   CVE-2022-38177 CVE-2022-38178 CVE-2022-40674 
                   CVE-2022-41974 
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.4.8 General
Availability release images, which fix security issues.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.4.8 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/

Security fixes:

* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)

* nodejs: undici vulnerable to CRLF via content headers (CVE-2022-35948)

* nodejs: undici.request vulnerable to SSRF (CVE-2022-35949)

* terser: insecure use of regular expressions leads to ReDoS
(CVE-2022-25858)

* search-api: SQL injection leads to remote denial of service
(CVE-2022-2238)

Bug fix: 

* RHACM 2.4.8 images (BZ# 2130745)

3. Solution:

For Red Hat Advanced Cluster Management for Kubernetes, see the following
documentation, which will be updated shortly for this release, for
important
instructions on installing this update:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing

4. Bugs fixed (https://bugzilla.redhat.com/):

2101669 - CVE-2022-2238 search-api: SQL injection leads to remote denial of service
2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS
2121068 - CVE-2022-35949 nodejs: undici.request vulnerable to SSRF
2121101 - CVE-2022-35948 nodejs: undici vulnerable to CRLF via content headers
2126277 - CVE-2022-25858 terser: insecure use of regular expressions leads to ReDoS
2130745 - RHACM 2.4.8 images

5. References:

https://access.redhat.com/security/cve/CVE-2020-35525
https://access.redhat.com/security/cve/CVE-2020-35527
https://access.redhat.com/security/cve/CVE-2022-0494
https://access.redhat.com/security/cve/CVE-2022-1353
https://access.redhat.com/security/cve/CVE-2022-2238
https://access.redhat.com/security/cve/CVE-2022-2509
https://access.redhat.com/security/cve/CVE-2022-2588
https://access.redhat.com/security/cve/CVE-2022-3515
https://access.redhat.com/security/cve/CVE-2022-23816
https://access.redhat.com/security/cve/CVE-2022-23825
https://access.redhat.com/security/cve/CVE-2022-25858
https://access.redhat.com/security/cve/CVE-2022-29900
https://access.redhat.com/security/cve/CVE-2022-29901
https://access.redhat.com/security/cve/CVE-2022-31129
https://access.redhat.com/security/cve/CVE-2022-34903
https://access.redhat.com/security/cve/CVE-2022-35948
https://access.redhat.com/security/cve/CVE-2022-35949
https://access.redhat.com/security/cve/CVE-2022-37434
https://access.redhat.com/security/cve/CVE-2022-38177
https://access.redhat.com/security/cve/CVE-2022-38178
https://access.redhat.com/security/cve/CVE-2022-40674
https://access.redhat.com/security/cve/CVE-2022-41974
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=2POm
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-7276:01 Moderate: Red Hat Advanced Cluster Management

Red Hat Advanced Cluster Management for Kubernetes 2.4.8 General Availability release images, which fix security issues

Summary

Red Hat Advanced Cluster Management for Kubernetes 2.4.8 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/
Security fixes:
* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)
* nodejs: undici vulnerable to CRLF via content headers (CVE-2022-35948)
* nodejs: undici.request vulnerable to SSRF (CVE-2022-35949)
* terser: insecure use of regular expressions leads to ReDoS (CVE-2022-25858)
* search-api: SQL injection leads to remote denial of service (CVE-2022-2238)
Bug fix:
* RHACM 2.4.8 images (BZ# 2130745)

Solution

For Red Hat Advanced Cluster Management for Kubernetes, see the followingdocumentation, which will be updated shortly for this release, forimportantinstructions on installing this update:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing

References

https://access.redhat.com/security/cve/CVE-2020-35525 https://access.redhat.com/security/cve/CVE-2020-35527 https://access.redhat.com/security/cve/CVE-2022-0494 https://access.redhat.com/security/cve/CVE-2022-1353 https://access.redhat.com/security/cve/CVE-2022-2238 https://access.redhat.com/security/cve/CVE-2022-2509 https://access.redhat.com/security/cve/CVE-2022-2588 https://access.redhat.com/security/cve/CVE-2022-3515 https://access.redhat.com/security/cve/CVE-2022-23816 https://access.redhat.com/security/cve/CVE-2022-23825 https://access.redhat.com/security/cve/CVE-2022-25858 https://access.redhat.com/security/cve/CVE-2022-29900 https://access.redhat.com/security/cve/CVE-2022-29901 https://access.redhat.com/security/cve/CVE-2022-31129 https://access.redhat.com/security/cve/CVE-2022-34903 https://access.redhat.com/security/cve/CVE-2022-35948 https://access.redhat.com/security/cve/CVE-2022-35949 https://access.redhat.com/security/cve/CVE-2022-37434 https://access.redhat.com/security/cve/CVE-2022-38177 https://access.redhat.com/security/cve/CVE-2022-38178 https://access.redhat.com/security/cve/CVE-2022-40674 https://access.redhat.com/security/cve/CVE-2022-41974 https://access.redhat.com/security/updates/classification/#moderate

Package List

Severity
Advisory ID: RHSA-2022:7276-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2022:7276
Issued Date: : 2022-11-01
CVE Names: CVE-2020-35525 CVE-2020-35527 CVE-2022-0494 CVE-2022-1353 CVE-2022-2238 CVE-2022-2509 CVE-2022-2588 CVE-2022-3515 CVE-2022-23816 CVE-2022-23825 CVE-2022-25858 CVE-2022-29900 CVE-2022-29901 CVE-2022-31129 CVE-2022-34903 CVE-2022-35948 CVE-2022-35949 CVE-2022-37434 CVE-2022-38177 CVE-2022-38178 CVE-2022-40674 CVE-2022-41974

Topic

Red Hat Advanced Cluster Management for Kubernetes 2.4.8 GeneralAvailability release images, which fix security issues.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE links in the References section.

Relevant Releases Architectures

Bugs Fixed

2101669 - CVE-2022-2238 search-api: SQL injection leads to remote denial of service

2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS

2121068 - CVE-2022-35949 nodejs: undici.request vulnerable to SSRF

2121101 - CVE-2022-35948 nodejs: undici vulnerable to CRLF via content headers

2126277 - CVE-2022-25858 terser: insecure use of regular expressions leads to ReDoS

2130745 - RHACM 2.4.8 images

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.