-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat Advanced Cluster Management 2.1.12 security fixes and container updates Advisory ID: RHSA-2021:3949-01 Product: Red Hat ACM Advisory URL: https://access.redhat.com/errata/RHSA-2021:3949 Issue date: 2021-10-20 CVE Names: CVE-2016-4658 CVE-2021-3653 CVE-2021-3656 CVE-2021-22543 CVE-2021-22922 CVE-2021-22923 CVE-2021-22924 CVE-2021-23840 CVE-2021-23841 CVE-2021-32626 CVE-2021-32627 CVE-2021-32628 CVE-2021-32672 CVE-2021-32675 CVE-2021-32687 CVE-2021-36222 CVE-2021-37576 CVE-2021-37750 CVE-2021-41099 ===================================================================== 1. Summary: Red Hat Advanced Cluster Management for Kubernetes 2.1.12 General Availability release images, which provide security fixes and update the container images. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat Advanced Cluster Management for Kubernetes 2.1.12 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains updates to one or more container images for Red Hat Advanced Cluster Management for Kubernetes. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.1/html/release_notes/ Security fixes: * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * redis: Out of bounds read in lua debugger protocol parser (CVE-2021-32672) For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Container updates: * RHACM 2.1.12 images (BZ# 2007489) 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. *Important:* This upgrade of Red Hat Advanced Cluster Management for Kubernetes is not supported when you are running Red Hat Advanced Cluster Management on Red Hat OpenShift Container Platform version 4.5. To apply this upgrade, you must upgrade your OpenShift Container Platform version to 4.6, or later. For details on how to apply this update, refer to: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.1/html/install/installing#upgrading-by-using-the-op erator 4. Bugs fixed (https://bugzilla.redhat.com/): 2007489 - RHACM 2.1.12 images 2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets 2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request 2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser 2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure 2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams 2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack 2011020 - CVE-2021-41099 redis: Integer overflow issue with strings 5. References: https://access.redhat.com/security/cve/CVE-2016-4658 https://access.redhat.com/security/cve/CVE-2021-3653 https://access.redhat.com/security/cve/CVE-2021-3656 https://access.redhat.com/security/cve/CVE-2021-22543 https://access.redhat.com/security/cve/CVE-2021-22922 https://access.redhat.com/security/cve/CVE-2021-22923 https://access.redhat.com/security/cve/CVE-2021-22924 https://access.redhat.com/security/cve/CVE-2021-23840 https://access.redhat.com/security/cve/CVE-2021-23841 https://access.redhat.com/security/cve/CVE-2021-32626 https://access.redhat.com/security/cve/CVE-2021-32627 https://access.redhat.com/security/cve/CVE-2021-32628 https://access.redhat.com/security/cve/CVE-2021-32672 https://access.redhat.com/security/cve/CVE-2021-32675 https://access.redhat.com/security/cve/CVE-2021-32687 https://access.redhat.com/security/cve/CVE-2021-36222 https://access.redhat.com/security/cve/CVE-2021-37576 https://access.redhat.com/security/cve/CVE-2021-37750 https://access.redhat.com/security/cve/CVE-2021-41099 https://access.redhat.com/security/updates/classification/#important 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYXBy89zjgjWX9erEAQidJRAAjBZW8NKlYCam/Ec3EL7Fq0qhjqfq40w3 W0K3ohqRU+Qk8obedR2BqnU6+Vp4JgXfSId6pexR1NW96vDXXORlbJkuY/QVUBaQ HpguRKWuxS3lKw5WXMLi//ZBYBtl61K3hUQPBciP+d+JY3KUBWDmKr46d2sEPeiR wI7aVdkkdCs2pVyNOGO7DXXaPDNMnJDGccV090chlGekJLwBtJFVTwKjKa3i6SlF CChDoS7+zLgXXj1LrG2cBvx+tcZhIx+LMQwLDgto0tpX86SD1pvFx+emanKnxJGq qnlRXnW/LA2i6ZWHH7BIDU5GJTPAU0vXPjfUy/5Pj49oOYGU/vuFIqXdM5tRQzSJ gyhl99AcERAJMvx57yUWM8o3O6Rjcy2GheCXzIjfOvMWZ2ExPsXsmI/5Uia6FBH5 UxKbRQOVqJl1/G36cOKuqWczQhCmgOT0EfUPMX4RgRTR9sNmLOKOMiHVO5YB9fJD ErcRuZGHYMaBMad5GPt1zPDN2Mj8N2X3eD92Aq9EhKzEh4/bizr6+JV5LqjknuNL pInkniLmTJNcb2NOso1ldIYA+eP0H4ozVwD6HRaBbbkLvznu/iOwPs8zlqZllVmE ShHZ9Dk0rWRb64CTCbQRXIWZt1ixnbB1w5ynXHDthR6sMThT+r3kFZAnZoVsbpYx 29P4K7z+F+I= =siEM -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce