exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2021-3454-01

Red Hat Security Advisory 2021-3454-01
Posted Sep 8, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3454-01 - Red Hat Advanced Cluster Management for Kubernetes 2.3.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs and security issues.

tags | advisory
systems | linux, redhat
advisories | CVE-2019-20149, CVE-2020-27777, CVE-2021-22543, CVE-2021-22555, CVE-2021-27218, CVE-2021-29154, CVE-2021-29650, CVE-2021-31535, CVE-2021-32399, CVE-2021-33195, CVE-2021-33197, CVE-2021-33198, CVE-2021-34558, CVE-2021-3609
SHA-256 | ededc503492f31daf90a74b29a6e64b1e7ee98978cd963f10901af9667484f8e

Red Hat Security Advisory 2021-3454-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Low: Red Hat Advanced Cluster Management 2.3.2 security and bug fix update
Advisory ID: RHSA-2021:3454-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3454
Issue date: 2021-09-07
CVE Names: CVE-2019-20149 CVE-2020-27777 CVE-2021-3609
CVE-2021-22543 CVE-2021-22555 CVE-2021-27218
CVE-2021-29154 CVE-2021-29650 CVE-2021-31535
CVE-2021-32399 CVE-2021-33195 CVE-2021-33197
CVE-2021-33198 CVE-2021-34558
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.3.2 General
Availability release images, which fix bugs and security issues.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.3.2 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs and security issues. See
the following Release Notes documentation, which will be updated shortly
for this release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.3/html/release_notes/

Security:

* nodejs-kind-of: ctorName in index.js allows external user input to
overwrite certain internal attributes (CVE-2019-20149)

Bugs:

* RHACM 2.3.2 images (BZ# 1991623)

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.3/html-single/install/index#installing

4. Bugs fixed (https://bugzilla.redhat.com/):

1959721 - CVE-2019-20149 nodejs-kind-of: ctorName in index.js allows external user input to overwrite certain internal attributes
1991623 - RHACM 2.3.2 images

5. References:

https://access.redhat.com/security/cve/CVE-2019-20149
https://access.redhat.com/security/cve/CVE-2020-27777
https://access.redhat.com/security/cve/CVE-2021-3609
https://access.redhat.com/security/cve/CVE-2021-22543
https://access.redhat.com/security/cve/CVE-2021-22555
https://access.redhat.com/security/cve/CVE-2021-27218
https://access.redhat.com/security/cve/CVE-2021-29154
https://access.redhat.com/security/cve/CVE-2021-29650
https://access.redhat.com/security/cve/CVE-2021-31535
https://access.redhat.com/security/cve/CVE-2021-32399
https://access.redhat.com/security/cve/CVE-2021-33195
https://access.redhat.com/security/cve/CVE-2021-33197
https://access.redhat.com/security/cve/CVE-2021-33198
https://access.redhat.com/security/cve/CVE-2021-34558
https://access.redhat.com/security/updates/classification/#low

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=TOrS
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    0 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close