what you don't know can hurt you

Red Hat Security Advisory 2021-3653-01

Red Hat Security Advisory 2021-3653-01
Posted Sep 24, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3653-01 - Red Hat Advanced Cluster Management 2.1.11 security fix and container updates are available.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-27777, CVE-2021-22555, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-23017, CVE-2021-29154, CVE-2021-29650, CVE-2021-31535, CVE-2021-32399, CVE-2021-36222, CVE-2021-3653, CVE-2021-37750
MD5 | ef43f11cebe0cd0e7f13da5997e4271e

Red Hat Security Advisory 2021-3653-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat Advanced Cluster Management 2.1.11 security fix and container updates
Advisory ID: RHSA-2021:3653-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3653
Issue date: 2021-09-23
CVE Names: CVE-2020-27777 CVE-2021-3653 CVE-2021-22555
CVE-2021-22922 CVE-2021-22923 CVE-2021-22924
CVE-2021-23017 CVE-2021-29154 CVE-2021-29650
CVE-2021-31535 CVE-2021-32399 CVE-2021-36222
CVE-2021-37750
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.1.11 General
Availability release images, which provide a security fix and update the
container images.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.1.11 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains updates to one or more container images for Red Hat
Advanced Cluster Management for Kubernetes. See the following Release Notes
documentation, which will be updated shortly for this release, for
additional
details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.1/html/release_notes/

Security fix:

* management-ingress-container: nginx: Off-by-one in ngx_resolver_copy()
when labels are followed by a pointer to a root domain name
(CVE-2021-23017)

For more details about the security issue, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Container updates:

* RHACM 2.1.11 images (BZ# 1999375)

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

*Important:* This upgrade of Red Hat Advanced Cluster Management for
Kubernetes
is not supported when you are running Red Hat Advanced Cluster Management
on
Red Hat OpenShift Container Platform version 4.5. To apply this upgrade,
you
must upgrade your OpenShift Container Platform version to 4.6, or later.

For details on how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.1/html/install/installing#upgrading-by-using-the-op
erator

4. Bugs fixed (https://bugzilla.redhat.com/):

1963121 - CVE-2021-23017 nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
1999375 - RHACM 2.1.11 images

5. References:

https://access.redhat.com/security/cve/CVE-2020-27777
https://access.redhat.com/security/cve/CVE-2021-3653
https://access.redhat.com/security/cve/CVE-2021-22555
https://access.redhat.com/security/cve/CVE-2021-22922
https://access.redhat.com/security/cve/CVE-2021-22923
https://access.redhat.com/security/cve/CVE-2021-22924
https://access.redhat.com/security/cve/CVE-2021-23017
https://access.redhat.com/security/cve/CVE-2021-29154
https://access.redhat.com/security/cve/CVE-2021-29650
https://access.redhat.com/security/cve/CVE-2021-31535
https://access.redhat.com/security/cve/CVE-2021-32399
https://access.redhat.com/security/cve/CVE-2021-36222
https://access.redhat.com/security/cve/CVE-2021-37750
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=1qOw
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

December 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    18 Files
  • 2
    Dec 2nd
    11 Files
  • 3
    Dec 3rd
    23 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    12 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close