exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2022-6507-01

Red Hat Security Advisory 2022-6507-01
Posted Sep 14, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-6507-01 - Red Hat Advanced Cluster Management for Kubernetes 2.5.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2022-1012, CVE-2022-1292, CVE-2022-1586, CVE-2022-1785, CVE-2022-1897, CVE-2022-1927, CVE-2022-2068, CVE-2022-2097, CVE-2022-2526, CVE-2022-29154, CVE-2022-31129, CVE-2022-32206, CVE-2022-32208, CVE-2022-32250
SHA-256 | 75e089711468232e4bcdf04ef4e769e7d5a865f427fde9d59fd2c9c9691dd6f8

Red Hat Security Advisory 2022-6507-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Critical: Red Hat Advanced Cluster Management 2.5.2 security fixes and bug fixes
Advisory ID: RHSA-2022:6507-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2022:6507
Issue date: 2022-09-13
CVE Names: CVE-2022-1012 CVE-2022-1292 CVE-2022-1586
CVE-2022-1785 CVE-2022-1897 CVE-2022-1927
CVE-2022-2068 CVE-2022-2097 CVE-2022-2526
CVE-2022-29154 CVE-2022-31129 CVE-2022-32206
CVE-2022-32208 CVE-2022-32250 CVE-2022-36067
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.5.2 General
Availability release images, which fix security issues and bugs.

Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.5.2 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/

Security fixes:

* moment: inefficient parsing algorithim resulting in DoS (CVE-2022-31129)
* vm2: Sandbox Escape in vm2 (CVE-2022-36067)

Bug fixes:

* Submariner Globalnet e2e tests failed on MTU between On-Prem to Public
clusters (BZ# 2074547)

* OCP 4.11 - Install fails because of: pods
"management-ingress-63029-5cf6789dd6-" is forbidden: unable to validate
against any security context constrain (BZ# 2082254)

* subctl gather fails to gather libreswan data if CableDriver field is
missing/empty in Submariner Spec (BZ# 2083659)

* Yaml editor for creating vSphere cluster moves to next line after typing
(BZ# 2086883)

* Submariner addon status doesn't track all deployment failures (BZ#
2090311)

* Unable to deploy Hypershift operator on MCE hub using ManagedClusterAddOn
without including s3 secret (BZ# 2091170)

* After switching to ACM 2.5 the managed clusters log "unable to create
ClusterClaim" errors (BZ# 2095481)

* Enforce failed and report the violation after modified memory value in
limitrange policy (BZ# 2100036)

* Creating an application fails with "This application has no subscription
match selector (spec.selector.matchExpressions)" (BZ# 2101577)

* Inconsistent cluster resource statuses between "All Subscription"
topology and individual topologies (BZ# 2102273)

* managed cluster is in "unknown" state for 120 mins after OADP restore

* RHACM 2.5.2 images (BZ# 2104553)

* Subscription UI does not allow binding to label with empty value (BZ#
2104961)

* Upgrade to 2.5.1 from 2.5.0 fails due to missing Subscription CRD (BZ#
2106069)

* Region information is not available for Azure cloud in managedcluster CR
(BZ# 2107134)

* cluster uninstall log points to incorrect container name (BZ# 2107359)

* ACM shows wrong path for Argo CD applicationset git generator (BZ#
2107885)

* Single node checkbox not visible for 4.11 images (BZ# 2109134)

* Unable to deploy hypershift cluster when enabling
validate-cluster-security (BZ# 2109544)

* Deletion of Application (including app related resources) from the
console fails to delete PlacementRule for the application (BZ# 20110026)

* After the creation by a policy of job or deployment (in case the object
is missing)ACM is trying to add new containers instead of updating (BZ#
2117728)

* pods in CrashLoopBackoff on 3.11 managed cluster (BZ# 2122292)

* ArgoCD and AppSet Applications do not deploy to local-cluster (BZ#
2124707)

3. Solution:

For Red Hat Advanced Cluster Management for Kubernetes, see the following
documentation, which will be updated shortly for this release, for
important
instructions about installing this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing

4. Bugs fixed (https://bugzilla.redhat.com/):

2074547 - Submariner Globalnet e2e tests failed on MTU between On-Prem to Public clusters
2082254 - OCP 4.11 - Install fails because of: pods "management-ingress-63029-5cf6789dd6-" is forbidden: unable to validate against any security context constraint
2083659 - subctl gather fails to gather libreswan data if CableDriver field is missing/empty in Submariner Spec
2086883 - Yaml editor for creating vSphere cluster moves to next line after typing
2090311 - Submariner addon status doesn't track all deployment failures
2091170 - Unable to deploy Hypershift operator on MCE hub using ManagedClusterAddOn without including s3 secret
2095481 - After switching to ACM 2.5 the managed clusters log "unable to create ClusterClaim" errors
2100036 - Enforce failed and report the violation after modified memory value in limitrange policy
2101577 - Creating an application fails with "This application has no subscription match selector (spec.selector.matchExpressions)"
2102273 - Inconsistent cluster resource statuses between "All Subscription" topology and individual topologies
2103653 - managed cluster is in "unknown" state for 120 mins after OADP restore
2104553 - RHACM 2.5.2 images
2104961 - Subscription UI does not allow binding to label with empty value
2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS
2106069 - Upgrade to 2.5.1 from 2.5.0 fails due to missing Subscription CRD
2107134 - Region information is not available for Azure cloud in managedcluster CR
2107359 - cluster uninstall log points to incorrect container name
2107885 - ACM shows wrong path for Argo CD applicationset git generator
2109134 - Single node checkbox not visible for 4.11 images
2110026 - Deletion of Application (including app related resources) from the console fails to delete PlacementRule for the application
2117728 - After the creation by a policy of job or deployment (in case the object is missing)ACM is trying to add new containers instead of updating
2122292 - pods in CrashLoopBackoff on 3.11 managed cluster
2124707 - ArgoCD and AppSet Applications do not deploy to local-cluster
2124794 - CVE-2022-36067 vm2: Sandbox Escape in vm2

5. References:

https://access.redhat.com/security/cve/CVE-2022-1012
https://access.redhat.com/security/cve/CVE-2022-1292
https://access.redhat.com/security/cve/CVE-2022-1586
https://access.redhat.com/security/cve/CVE-2022-1785
https://access.redhat.com/security/cve/CVE-2022-1897
https://access.redhat.com/security/cve/CVE-2022-1927
https://access.redhat.com/security/cve/CVE-2022-2068
https://access.redhat.com/security/cve/CVE-2022-2097
https://access.redhat.com/security/cve/CVE-2022-2526
https://access.redhat.com/security/cve/CVE-2022-29154
https://access.redhat.com/security/cve/CVE-2022-31129
https://access.redhat.com/security/cve/CVE-2022-32206
https://access.redhat.com/security/cve/CVE-2022-32208
https://access.redhat.com/security/cve/CVE-2022-32250
https://access.redhat.com/security/cve/CVE-2022-36067
https://access.redhat.com/security/updates/classification/#critical

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=y1WG
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close