-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Advanced Cluster Management 2.4.8 security fixes and container updates Advisory ID: RHSA-2022:7276-01 Product: Red Hat ACM Advisory URL: https://access.redhat.com/errata/RHSA-2022:7276 Issue date: 2022-11-01 CVE Names: CVE-2020-35525 CVE-2020-35527 CVE-2022-0494 CVE-2022-1353 CVE-2022-2238 CVE-2022-2509 CVE-2022-2588 CVE-2022-3515 CVE-2022-23816 CVE-2022-23825 CVE-2022-25858 CVE-2022-29900 CVE-2022-29901 CVE-2022-31129 CVE-2022-34903 CVE-2022-35948 CVE-2022-35949 CVE-2022-37434 CVE-2022-38177 CVE-2022-38178 CVE-2022-40674 CVE-2022-41974 ===================================================================== 1. Summary: Red Hat Advanced Cluster Management for Kubernetes 2.4.8 General Availability release images, which fix security issues. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section. 2. Description: Red Hat Advanced Cluster Management for Kubernetes 2.4.8 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html/release_notes/ Security fixes: * moment: inefficient parsing algorithm resulting in DoS (CVE-2022-31129) * nodejs: undici vulnerable to CRLF via content headers (CVE-2022-35948) * nodejs: undici.request vulnerable to SSRF (CVE-2022-35949) * terser: insecure use of regular expressions leads to ReDoS (CVE-2022-25858) * search-api: SQL injection leads to remote denial of service (CVE-2022-2238) Bug fix: * RHACM 2.4.8 images (BZ# 2130745) 3. Solution: For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on installing this update: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.4/html-single/install/index#installing 4. Bugs fixed (https://bugzilla.redhat.com/): 2101669 - CVE-2022-2238 search-api: SQL injection leads to remote denial of service 2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS 2121068 - CVE-2022-35949 nodejs: undici.request vulnerable to SSRF 2121101 - CVE-2022-35948 nodejs: undici vulnerable to CRLF via content headers 2126277 - CVE-2022-25858 terser: insecure use of regular expressions leads to ReDoS 2130745 - RHACM 2.4.8 images 5. References: https://access.redhat.com/security/cve/CVE-2020-35525 https://access.redhat.com/security/cve/CVE-2020-35527 https://access.redhat.com/security/cve/CVE-2022-0494 https://access.redhat.com/security/cve/CVE-2022-1353 https://access.redhat.com/security/cve/CVE-2022-2238 https://access.redhat.com/security/cve/CVE-2022-2509 https://access.redhat.com/security/cve/CVE-2022-2588 https://access.redhat.com/security/cve/CVE-2022-3515 https://access.redhat.com/security/cve/CVE-2022-23816 https://access.redhat.com/security/cve/CVE-2022-23825 https://access.redhat.com/security/cve/CVE-2022-25858 https://access.redhat.com/security/cve/CVE-2022-29900 https://access.redhat.com/security/cve/CVE-2022-29901 https://access.redhat.com/security/cve/CVE-2022-31129 https://access.redhat.com/security/cve/CVE-2022-34903 https://access.redhat.com/security/cve/CVE-2022-35948 https://access.redhat.com/security/cve/CVE-2022-35949 https://access.redhat.com/security/cve/CVE-2022-37434 https://access.redhat.com/security/cve/CVE-2022-38177 https://access.redhat.com/security/cve/CVE-2022-38178 https://access.redhat.com/security/cve/CVE-2022-40674 https://access.redhat.com/security/cve/CVE-2022-41974 https://access.redhat.com/security/updates/classification/#moderate 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY2HABdzjgjWX9erEAQh3Ag//dgPuJIdQjHaZFtnPY2qmwtEFVixlbL6v ylohkUGuWkhh0ecM3JK7eK0Ku3f2Ady7wv2HgTkL4OHSdRH1iDCuZOO+zWQ20OOV K/fdXi1/ZFObbsxR8uptDAQw/X6sH35VJLCIQh8IjPBD3FQ6yxnBW4x5dhPcFOzO igwx1tyJp02sllc37LX+aUamxxHQYl4IJ//SMJWOR5r5GpIbsI4aq88qaGAJ4Df7 CZmri0dyYRZ5EOIA3LBt/tqJ7cxzxc0WzuhVWnwaRNxrdtETh958uKjkbodQE6Ez DWNWHPaZ+Ecw6XPj1BYHljSzH9KyQPwtHf39sJtN6SZlxEAPgrv2e0rMWt3ze1xC qO1jwI80pe79QLDQyvfRylZtz7rQmhD/M1CZ8da948MRO1TcwLfB2RyJ8sH+FzpL 6HqpH5KSeqnxOswKX6iORrErMmtXf6VjQ+8gJi5ag8H86qzfwLu76lAvHd7VrUFH rkzWV7Osqhw4L7z1eVH82WHvWg6OW2rf8MCqiRI/5XC/7YO3U2bDNX4c7VNe5MN6 wYH8tB9CO7VciMItfasujInDTKny/TVbDTtdpP698yWfVj1y421y8QP9zY+VsWo9 aM2sszRVBBQI41ynwLl24rxHZC/SKTPEg51rrD9whNeDai8+ndvKdzN/WHj/h/+p AK6iI/4wJLQ= =2POm -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce