what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2021-3949-01

Red Hat Security Advisory 2021-3949-01
Posted Oct 21, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3949-01 - Red Hat Advanced Cluster Management for Kubernetes 2.1.12 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains updates to one or more container images for Red Hat Advanced Cluster Management for Kubernetes. Issues addressed include denial of service, integer overflow, and out of bounds read vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability
systems | linux, redhat
advisories | CVE-2016-4658, CVE-2021-22543, CVE-2021-22922, CVE-2021-22923, CVE-2021-22924, CVE-2021-23840, CVE-2021-23841, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-36222, CVE-2021-3653, CVE-2021-3656, CVE-2021-37576, CVE-2021-37750, CVE-2021-41099
SHA-256 | da3bb0a2f0aedf1b55d5f8cbbece5dc6749623ae797a40f9e1cf9bf6796ee1a4

Red Hat Security Advisory 2021-3949-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat Advanced Cluster Management 2.1.12 security fixes and container updates
Advisory ID: RHSA-2021:3949-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3949
Issue date: 2021-10-20
CVE Names: CVE-2016-4658 CVE-2021-3653 CVE-2021-3656
CVE-2021-22543 CVE-2021-22922 CVE-2021-22923
CVE-2021-22924 CVE-2021-23840 CVE-2021-23841
CVE-2021-32626 CVE-2021-32627 CVE-2021-32628
CVE-2021-32672 CVE-2021-32675 CVE-2021-32687
CVE-2021-36222 CVE-2021-37576 CVE-2021-37750
CVE-2021-41099
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.1.12 General
Availability release images, which provide security fixes and update the
container images.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.1.12 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains updates to one or more container images for Red Hat
Advanced Cluster Management for Kubernetes. See the following Release Notes
documentation, which will be updated shortly for this release, for
additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.1/html/release_notes/

Security fixes:

* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)

* redis: Integer overflow issue with Streams (CVE-2021-32627)

* redis: Integer overflow bug in the ziplist data structure
(CVE-2021-32628)

* redis: Integer overflow issue with intsets (CVE-2021-32687)

* redis: Integer overflow issue with strings (CVE-2021-41099)

* redis: Denial of service via Redis Standard Protocol (RESP) request
(CVE-2021-32675)

* redis: Out of bounds read in lua debugger protocol parser
(CVE-2021-32672)

For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Container updates:

* RHACM 2.1.12 images (BZ# 2007489)

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

*Important:* This upgrade of Red Hat Advanced Cluster Management for
Kubernetes
is not supported when you are running Red Hat Advanced Cluster Management
on
Red Hat OpenShift Container Platform version 4.5. To apply this upgrade,
you
must upgrade your OpenShift Container Platform version to 4.6, or later.

For details on how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.1/html/install/installing#upgrading-by-using-the-op
erator

4. Bugs fixed (https://bugzilla.redhat.com/):

2007489 - RHACM 2.1.12 images
2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets
2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request
2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser
2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure
2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams
2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack
2011020 - CVE-2021-41099 redis: Integer overflow issue with strings

5. References:

https://access.redhat.com/security/cve/CVE-2016-4658
https://access.redhat.com/security/cve/CVE-2021-3653
https://access.redhat.com/security/cve/CVE-2021-3656
https://access.redhat.com/security/cve/CVE-2021-22543
https://access.redhat.com/security/cve/CVE-2021-22922
https://access.redhat.com/security/cve/CVE-2021-22923
https://access.redhat.com/security/cve/CVE-2021-22924
https://access.redhat.com/security/cve/CVE-2021-23840
https://access.redhat.com/security/cve/CVE-2021-23841
https://access.redhat.com/security/cve/CVE-2021-32626
https://access.redhat.com/security/cve/CVE-2021-32627
https://access.redhat.com/security/cve/CVE-2021-32628
https://access.redhat.com/security/cve/CVE-2021-32672
https://access.redhat.com/security/cve/CVE-2021-32675
https://access.redhat.com/security/cve/CVE-2021-32687
https://access.redhat.com/security/cve/CVE-2021-36222
https://access.redhat.com/security/cve/CVE-2021-37576
https://access.redhat.com/security/cve/CVE-2021-37750
https://access.redhat.com/security/cve/CVE-2021-41099
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=siEM
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    26 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    18 Files
  • 21
    Jun 21st
    8 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    19 Files
  • 25
    Jun 25th
    5 Files
  • 26
    Jun 26th
    13 Files
  • 27
    Jun 27th
    42 Files
  • 28
    Jun 28th
    9 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close