-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat Advanced Cluster Management 2.2.9 security, bug, and container updates Advisory ID: RHSA-2021:3873-01 Product: Red Hat ACM Advisory URL: https://access.redhat.com/errata/RHSA-2021:3873 Issue date: 2021-10-14 CVE Names: CVE-2021-3653 CVE-2021-22922 CVE-2021-22923 CVE-2021-22924 CVE-2021-23017 CVE-2021-23434 CVE-2021-32626 CVE-2021-32627 CVE-2021-32628 CVE-2021-32672 CVE-2021-32675 CVE-2021-32687 CVE-2021-36222 CVE-2021-37750 CVE-2021-41099 ===================================================================== 1. Summary: Red Hat Advanced Cluster Management for Kubernetes 2.2.9 General Availability release images, which provide security updates, one or more container updates, and bug fixes. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat Advanced Cluster Management for Kubernetes 2.2.9 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console — with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which provide bug fixes and security fixes. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.2/html/release_notes/ Security fixes: * nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017) * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) * redis: Out of bounds read in lua debugger protocol parser (CVE-2021-32672) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-15256 (CVE-2021-23434) Bug fixes: * RHACM 2.2.9 images (BZ #1999601) 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.2/html-single/install/index#installing 4. Bugs fixed (https://bugzilla.redhat.com/): 1963121 - CVE-2021-23017 nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name 1999601 - RHACM 2.2.9 images 1999810 - CVE-2021-23434 object-path: Type confusion vulnerability can lead to a bypass of CVE-2020-15256 2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets 2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request 2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser 2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure 2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams 2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack 2011020 - CVE-2021-41099 redis: Integer overflow issue with strings 5. References: https://access.redhat.com/security/cve/CVE-2021-3653 https://access.redhat.com/security/cve/CVE-2021-22922 https://access.redhat.com/security/cve/CVE-2021-22923 https://access.redhat.com/security/cve/CVE-2021-22924 https://access.redhat.com/security/cve/CVE-2021-23017 https://access.redhat.com/security/cve/CVE-2021-23434 https://access.redhat.com/security/cve/CVE-2021-32626 https://access.redhat.com/security/cve/CVE-2021-32627 https://access.redhat.com/security/cve/CVE-2021-32628 https://access.redhat.com/security/cve/CVE-2021-32672 https://access.redhat.com/security/cve/CVE-2021-32675 https://access.redhat.com/security/cve/CVE-2021-32687 https://access.redhat.com/security/cve/CVE-2021-36222 https://access.redhat.com/security/cve/CVE-2021-37750 https://access.redhat.com/security/cve/CVE-2021-41099 https://access.redhat.com/security/updates/classification/#important 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYWiy79zjgjWX9erEAQhtBw/9Hvq+igyzMgIk/gsxbFhhXJmToRaqxMMZ wQ0VuHVd0kWgFLT+5+2HaA4vblZ0TUYKxQNyZUUtVG0VK8C91m+p14BIJgRncnBe 2okp49LKNTwz4KTCc8cAfR+8+PIVMf0ENWO+qv2Z2fvoKn52pcsS7OBRAd7UJXXI axU/58lXLCg9nwgRB+C4k6uSOkVNuiMpziOt9bZEzLpVbxnYkq3qoq4DdwF4+AxS 3utNEwKyIKuRJMWwAT0ikpg5+LQT5yPsHCIJSihA1O/zFJiQyzzCsbh9OR4Y5YOd XpIc7n5Wb0slRh+nEG7VelwmO3aWCj2eySTtmlLebJwsC2Y4eqN27RLJp+5tUuMZ ckiQundDCvXC03GUcW0gWcSjT0FekKlRu6D8EShi35RLOWD9HSEFoOp2CQ3FLHSW LMa3rw1x+TpthX3RGoob85FX/j0knEOzDn/87QApeSKvuorsilxUK9vK1LJ0kPzR BSvfcTUvUy273PfOzypO7WIojhULzcNpI5tFp+ziOQhIE76i5g1J9h+CE9pETG+F sDggjDuuezC0kK18JAtqavGet4K+pLmLJ23pHAxiJrwqU6nb36CgXZmjeBS877fs lBx8UjStrrVUnWtaZSTLCZCmFymYj/xsbQdZF7L1NSNM+foI/BkvAY0yboAHHOSi 0Wp8M0Cbv3s= =taOi -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce