Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.0932 Red Hat Advanced Cluster Management 2.6.4 bug fixes and security updates 16 February 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat Advanced Cluster Management Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-47629 CVE-2022-46285 CVE-2022-44617 CVE-2022-43680 CVE-2022-42012 CVE-2022-42011 CVE-2022-42010 CVE-2022-41903 CVE-2022-40304 CVE-2022-40303 CVE-2022-35737 CVE-2022-24999 CVE-2022-23521 CVE-2022-4883 CVE-2022-4139 CVE-2022-2964 CVE-2022-2953 CVE-2022-2869 CVE-2022-2868 CVE-2022-2867 CVE-2022-2521 CVE-2022-2520 CVE-2022-2519 CVE-2022-2058 CVE-2022-2057 CVE-2022-2056 CVE-2021-46848 Original Bulletin: https://access.redhat.com/errata/RHSA-2023:0794 Comment: CVSS (Max): 9.8 CVE-2022-47629 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Advanced Cluster Management 2.6.4 bug fixes and security updates Advisory ID: RHSA-2023:0794-01 Product: Red Hat ACM Advisory URL: https://access.redhat.com/errata/RHSA-2023:0794 Issue date: 2023-02-15 CVE Names: CVE-2021-46848 CVE-2022-2056 CVE-2022-2057 CVE-2022-2058 CVE-2022-2519 CVE-2022-2520 CVE-2022-2521 CVE-2022-2867 CVE-2022-2868 CVE-2022-2869 CVE-2022-2953 CVE-2022-2964 CVE-2022-4139 CVE-2022-4883 CVE-2022-23521 CVE-2022-24999 CVE-2022-35737 CVE-2022-40303 CVE-2022-40304 CVE-2022-41903 CVE-2022-42010 CVE-2022-42011 CVE-2022-42012 CVE-2022-43680 CVE-2022-44617 CVE-2022-46285 CVE-2022-47629 ===================================================================== 1. Summary: Red Hat Advanced Cluster Management for Kubernetes 2.6.4 General Availability release images, which fix bugs and update container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section. 2. Description: Red Hat Advanced Cluster Management for Kubernetes 2.6.4 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/release_notes/ Issue addressed: * RHACM 2.6.4 images (BZ# 2153382) Security fixes: * CVE-2022-24999 express: "qs" prototype poisoning causes the hang of the node process 3. Solution: For Red Hat Advanced Cluster Management for Kubernetes, see the following documentation, which will be updated shortly for this release, for important instructions on installing this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html-single/install/index#installing 4. Bugs fixed (https://bugzilla.redhat.com/): 2150323 - CVE-2022-24999 express: "qs" prototype poisoning causes the hang of the node process 2153382 - RHACM 2.6.4 images 5. References: https://access.redhat.com/security/cve/CVE-2021-46848 https://access.redhat.com/security/cve/CVE-2022-2056 https://access.redhat.com/security/cve/CVE-2022-2057 https://access.redhat.com/security/cve/CVE-2022-2058 https://access.redhat.com/security/cve/CVE-2022-2519 https://access.redhat.com/security/cve/CVE-2022-2520 https://access.redhat.com/security/cve/CVE-2022-2521 https://access.redhat.com/security/cve/CVE-2022-2867 https://access.redhat.com/security/cve/CVE-2022-2868 https://access.redhat.com/security/cve/CVE-2022-2869 https://access.redhat.com/security/cve/CVE-2022-2953 https://access.redhat.com/security/cve/CVE-2022-2964 https://access.redhat.com/security/cve/CVE-2022-4139 https://access.redhat.com/security/cve/CVE-2022-4883 https://access.redhat.com/security/cve/CVE-2022-23521 https://access.redhat.com/security/cve/CVE-2022-24999 https://access.redhat.com/security/cve/CVE-2022-35737 https://access.redhat.com/security/cve/CVE-2022-40303 https://access.redhat.com/security/cve/CVE-2022-40304 https://access.redhat.com/security/cve/CVE-2022-41903 https://access.redhat.com/security/cve/CVE-2022-42010 https://access.redhat.com/security/cve/CVE-2022-42011 https://access.redhat.com/security/cve/CVE-2022-42012 https://access.redhat.com/security/cve/CVE-2022-43680 https://access.redhat.com/security/cve/CVE-2022-44617 https://access.redhat.com/security/cve/CVE-2022-46285 https://access.redhat.com/security/cve/CVE-2022-47629 https://access.redhat.com/security/updates/classification/#moderate 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY+14w9zjgjWX9erEAQjN6A//dS9FWPlW5LaSH4BBuxC7dSbo7Y/kXt16 dB2Gv8iEe2GD2YcxqYplhNAVHyYL9jlK/UApuVl8QHBSIu1z7GaQQa4FV5HbIOPs 4jI39SqWM/CNtiBB9HLKKQGEyAGhn0EMYD2DXBKOQDcxm4PrhdeZR8hvv5tzq8fb +C7GgpZ0R4ACyFBnOYouzdZS73pPXRQiA0UHeQ0p4gdhR8fIlIkAELbGP0b1XEQE kFmODBr1O4k6ZOtyYpNdEXhd0VGoQHKFEBJW6aa37iSaPTumRjuc0wRFDpgL52ps 5GRfkx3cB8yd1WnQZ7jQaj1SUGzYYVM9PNTTkZrDNznrSCR78kfzd0QE+IlPExBW hA9w7gtFCHP8g4tinE2cMNUZ3pHvMHnIXGF41RzIuSHzjJtIcFPVwlPiQr+BCoGn B3rLngMGuLhLphzD6j4RfuPDC1QI3HsJTfwW0/56h4OUKkmsE4si2Lina4+WiNVJ aPPqc4IHupjVHAKmEowT6VsFUQUssFcsX7JqbY9az77/Kckd2JSpGtlhhErXoLkv v5nQqNMk8ZZEiTNAgIgKsy76B9nFUjuuP36vZcXCOZCV2fnrdrHO/nEjMo3KcSti JVl3FJjsssfW+2gudURQR4qmUros/rD5KES6lT3w+u6EotthrQWy919RbV2kK3SN ctzqk57GcUU= =5hc1 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY+2Ze8kNZI30y1K9AQiilQ//eC4JGSYKnIW9GN1neX3fTDbdfgNFHBh5 3e/fHQWbtw6+VeqP3N88NqkODTEcsDGISnRE93PguSEQw12bsRhvuPO2OqyY31cT YO4jkeraAxiB4tGZPo2twLQ1RShSo11hsnWrWGL2PTYA3HGIQTC8kBx4Fl9GleFi ZqPqfADrpeNn3ekdWb9Ak2wuKfASu6b2T+SSTkG0qgOc7Z5spjGTboRB1uecV6ow Wl1YIQLj9tSL4JryG717AE0PiqYRJvitRMwdhbQLCmFfWTxSilmpgXA5NaZoIYOX 5GmeWU0YKjeeJgRqoKAuhsiTLZs9c23a3yOD6ibGAuCoGUEHiC2hjncp3N0smS2r ZMnksIVaycK1vWHiz5Ajlh13pBt6EQdrEqW+uUNtaOzNZvxuNnX6Bwz9iprCKxac ditf4MbIwbKKrG3gUtUO7DwDk8B9FJIhG1Dy+3qdQUNDBXUCyHSDkLHZdVOh6FFc VOkciBi+qAthVw2q1c4bni1z5dWlyHr1G2Gl2Vg0dpEqs17tKpY4jhCaqGLLwDoA V++J0Glrjev35jc8dN0fpU8QTpFbpjU/t5mcPdQ1XY0ofT0sVMhzEFqAht06t06R 5pOc5LBt4pPm7tr9/PgbBLA/tDEyGDWxeyZo224S+sLphl5+uY9hFIhSapBGei+P BtNCix05J5k= =zIah -----END PGP SIGNATURE-----