RedHat: RHSA-2022-7313:01 Moderate: Red Hat Advanced Cluster Manage...
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Advanced Cluster Management 2.6.2 security update and bug fixes
Advisory ID:       RHSA-2022:7313-01
Product:           Red Hat ACM
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:7313
Issue date:        2022-11-02
CVE Names:         CVE-2015-20107 CVE-2020-35525 CVE-2020-35527 
                   CVE-2022-0391 CVE-2022-0494 CVE-2022-1353 
                   CVE-2022-2238 CVE-2022-2509 CVE-2022-2588 
                   CVE-2022-3515 CVE-2022-23816 CVE-2022-23825 
                   CVE-2022-25858 CVE-2022-25887 CVE-2022-25896 
                   CVE-2022-29900 CVE-2022-29901 CVE-2022-31129 
                   CVE-2022-34903 CVE-2022-37434 CVE-2022-40674 
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.6.2 General
Availability release images, which fix bugs and update container images.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.6.2 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/release_notes/

Security fixes:

* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)

* passport: incorrect session regeneration (CVE-2022-25896)

* sanitize-html: insecure global regular expression replacement logic may
lead to ReDoS (CVE-2022-25887)

* terser: insecure use of regular expressions leads to ReDoS
(CVE-2022-25858)

* search-api: SQL injection leads to remote denial of service
(CVE-2022-2238)

Bug fixes:

* ACM 2.6.2 images (BZ# 2126195)

* Infra MachineSet Replicate Taint (BZ# 2116528)

* Work agent panic when apply the manifestwork (BZ# 2120920)

* unexpected difference of behavior in inform policies with lists of
apiGroups for ClusterRole resources (BZ# 2130985)

3. Solution:

For Red Hat Advanced Cluster Management for Kubernetes, see the following
documentation, which will be updated shortly for this release, for
important
instructions on installing this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing

4. Bugs fixed (https://bugzilla.redhat.com/):

2101669 - CVE-2022-2238 search-api: SQL injection leads to remote denial of service
2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS
2111862 - CVE-2022-25896 passport: incorrect session regeneration
2116528 - Infra MachineSet Replicate Taint
2120920 - work agent panic when apply the manifestwork
2123376 - CVE-2022-25887 sanitize-html: insecure global regular expression replacement logic may lead to ReDoS
2126277 - CVE-2022-25858 terser: insecure use of regular expressions leads to ReDoS
2130985 - unexpected difference of behaviour in inform policies with lists of apiGroups for ClusterRole ressources

5. References:

https://access.redhat.com/security/cve/CVE-2015-20107
https://access.redhat.com/security/cve/CVE-2020-35525
https://access.redhat.com/security/cve/CVE-2020-35527
https://access.redhat.com/security/cve/CVE-2022-0391
https://access.redhat.com/security/cve/CVE-2022-0494
https://access.redhat.com/security/cve/CVE-2022-1353
https://access.redhat.com/security/cve/CVE-2022-2238
https://access.redhat.com/security/cve/CVE-2022-2509
https://access.redhat.com/security/cve/CVE-2022-2588
https://access.redhat.com/security/cve/CVE-2022-3515
https://access.redhat.com/security/cve/CVE-2022-23816
https://access.redhat.com/security/cve/CVE-2022-23825
https://access.redhat.com/security/cve/CVE-2022-25858
https://access.redhat.com/security/cve/CVE-2022-25887
https://access.redhat.com/security/cve/CVE-2022-25896
https://access.redhat.com/security/cve/CVE-2022-29900
https://access.redhat.com/security/cve/CVE-2022-29901
https://access.redhat.com/security/cve/CVE-2022-31129
https://access.redhat.com/security/cve/CVE-2022-34903
https://access.redhat.com/security/cve/CVE-2022-37434
https://access.redhat.com/security/cve/CVE-2022-40674
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=9tk5
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-7313:01 Moderate: Red Hat Advanced Cluster Management

Red Hat Advanced Cluster Management for Kubernetes 2.6.2 General Availability release images, which fix bugs and update container images

Summary

Red Hat Advanced Cluster Management for Kubernetes 2.6.2 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/release_notes/
Security fixes:
* moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129)
* passport: incorrect session regeneration (CVE-2022-25896)
* sanitize-html: insecure global regular expression replacement logic may lead to ReDoS (CVE-2022-25887)
* terser: insecure use of regular expressions leads to ReDoS (CVE-2022-25858)
* search-api: SQL injection leads to remote denial of service (CVE-2022-2238)
Bug fixes:
* ACM 2.6.2 images (BZ# 2126195)
* Infra MachineSet Replicate Taint (BZ# 2116528)
* Work agent panic when apply the manifestwork (BZ# 2120920)
* unexpected difference of behavior in inform policies with lists of apiGroups for ClusterRole resources (BZ# 2130985)

Solution

For Red Hat Advanced Cluster Management for Kubernetes, see the followingdocumentation, which will be updated shortly for this release, forimportantinstructions on installing this release:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing

References

https://access.redhat.com/security/cve/CVE-2015-20107 https://access.redhat.com/security/cve/CVE-2020-35525 https://access.redhat.com/security/cve/CVE-2020-35527 https://access.redhat.com/security/cve/CVE-2022-0391 https://access.redhat.com/security/cve/CVE-2022-0494 https://access.redhat.com/security/cve/CVE-2022-1353 https://access.redhat.com/security/cve/CVE-2022-2238 https://access.redhat.com/security/cve/CVE-2022-2509 https://access.redhat.com/security/cve/CVE-2022-2588 https://access.redhat.com/security/cve/CVE-2022-3515 https://access.redhat.com/security/cve/CVE-2022-23816 https://access.redhat.com/security/cve/CVE-2022-23825 https://access.redhat.com/security/cve/CVE-2022-25858 https://access.redhat.com/security/cve/CVE-2022-25887 https://access.redhat.com/security/cve/CVE-2022-25896 https://access.redhat.com/security/cve/CVE-2022-29900 https://access.redhat.com/security/cve/CVE-2022-29901 https://access.redhat.com/security/cve/CVE-2022-31129 https://access.redhat.com/security/cve/CVE-2022-34903 https://access.redhat.com/security/cve/CVE-2022-37434 https://access.redhat.com/security/cve/CVE-2022-40674 https://access.redhat.com/security/updates/classification/#moderate

Package List

Severity
Advisory ID: RHSA-2022:7313-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2022:7313
Issued Date: : 2022-11-02
CVE Names: CVE-2015-20107 CVE-2020-35525 CVE-2020-35527 CVE-2022-0391 CVE-2022-0494 CVE-2022-1353 CVE-2022-2238 CVE-2022-2509 CVE-2022-2588 CVE-2022-3515 CVE-2022-23816 CVE-2022-23825 CVE-2022-25858 CVE-2022-25887 CVE-2022-25896 CVE-2022-29900 CVE-2022-29901 CVE-2022-31129 CVE-2022-34903 CVE-2022-37434 CVE-2022-40674

Topic

Red Hat Advanced Cluster Management for Kubernetes 2.6.2 GeneralAvailability release images, which fix bugs and update container images.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.

Relevant Releases Architectures

Bugs Fixed

2101669 - CVE-2022-2238 search-api: SQL injection leads to remote denial of service

2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS

2111862 - CVE-2022-25896 passport: incorrect session regeneration

2116528 - Infra MachineSet Replicate Taint

2120920 - work agent panic when apply the manifestwork

2123376 - CVE-2022-25887 sanitize-html: insecure global regular expression replacement logic may lead to ReDoS

2126277 - CVE-2022-25858 terser: insecure use of regular expressions leads to ReDoS

2130985 - unexpected difference of behaviour in inform policies with lists of apiGroups for ClusterRole ressources

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.