-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.4172
 Red Hat Advanced Cluster Management 2.2.10 security updates and bug fixes
                              9 December 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat Advanced Cluster Management 2.2.10
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
                   Provide Misleading Information  -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
                   Reduced Security                -- Remote/Unauthenticated
                   Increased Privileges            -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-43527 CVE-2021-43267 CVE-2021-42574
                   CVE-2021-37750 CVE-2021-36087 CVE-2021-36086
                   CVE-2021-36085 CVE-2021-36084 CVE-2021-35942
                   CVE-2021-33938 CVE-2021-33930 CVE-2021-33929
                   CVE-2021-33928 CVE-2021-33574 CVE-2021-33560
                   CVE-2021-28153 CVE-2021-27645 CVE-2021-23841
                   CVE-2021-23840 CVE-2021-23440 CVE-2021-22947
                   CVE-2021-22946 CVE-2021-22925 CVE-2021-22898
                   CVE-2021-22876 CVE-2021-20317 CVE-2021-20271
                   CVE-2021-20266 CVE-2021-20232 CVE-2021-20231
                   CVE-2021-3800 CVE-2021-3796 CVE-2021-3795
                   CVE-2021-3778 CVE-2021-3733 CVE-2021-3580
                   CVE-2021-3572 CVE-2021-3445 CVE-2021-3426
                   CVE-2021-3200 CVE-2020-36385 CVE-2020-24370
                   CVE-2020-16135 CVE-2020-14155 CVE-2020-14145
                   CVE-2020-13435 CVE-2020-12762 CVE-2019-20838
                   CVE-2019-19603 CVE-2019-18218 CVE-2019-17595
                   CVE-2019-17594 CVE-2019-13751 CVE-2019-13750
                   CVE-2019-10747 CVE-2019-5827 CVE-2018-20673

Reference:         ESB-2021.4165

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:5038

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: Red Hat Advanced Cluster Management 2.2.10 security updates and bug fixes
Advisory ID:       RHSA-2021:5038-01
Product:           Red Hat ACM
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:5038
Issue date:        2021-12-08
CVE Names:         CVE-2018-20673 CVE-2019-5827 CVE-2019-13750 
                   CVE-2019-13751 CVE-2019-17594 CVE-2019-17595 
                   CVE-2019-18218 CVE-2019-19603 CVE-2019-20838 
                   CVE-2020-12762 CVE-2020-13435 CVE-2020-14145 
                   CVE-2020-14155 CVE-2020-16135 CVE-2020-24370 
                   CVE-2020-36385 CVE-2021-3200 CVE-2021-3426 
                   CVE-2021-3445 CVE-2021-3572 CVE-2021-3580 
                   CVE-2021-3733 CVE-2021-3778 CVE-2021-3795 
                   CVE-2021-3796 CVE-2021-3800 CVE-2021-20231 
                   CVE-2021-20232 CVE-2021-20266 CVE-2021-20271 
                   CVE-2021-20317 CVE-2021-22876 CVE-2021-22898 
                   CVE-2021-22925 CVE-2021-22946 CVE-2021-22947 
                   CVE-2021-23440 CVE-2021-23840 CVE-2021-23841 
                   CVE-2021-27645 CVE-2021-28153 CVE-2021-33560 
                   CVE-2021-33574 CVE-2021-33928 CVE-2021-33929 
                   CVE-2021-33930 CVE-2021-33938 CVE-2021-35942 
                   CVE-2021-36084 CVE-2021-36085 CVE-2021-36086 
                   CVE-2021-36087 CVE-2021-37750 CVE-2021-42574 
                   CVE-2021-43267 CVE-2021-43527 
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.2.10 General
Availability release images, which provide one or more container updates
and bug fixes.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score,
which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.2.10 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments.

Clusters and applications are all visible and managed from a single console
â\x{128}\x{148} with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which provide security fixes, bug fixes and
container upgrades. See the following Release Notes documentation, which
will be updated shortly for this release, for additional details about this
release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html/release_notes/

Security fixes: 

* CVE-2021-3795 semver-regex: inefficient regular expression complexity

* CVE-2021-23440 nodejs-set-value: type confusion allows bypass of
CVE-2019-10747

Related bugs: 

* RHACM 2.2.10 images (Bugzilla #2013652)

3. Solution:

For Red Hat Advanced Cluster Management for Kubernetes, see the following
documentation, which will be updated shortly for this release, for
important instructions on how to upgrade your cluster and fully apply this
asynchronous errata update:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html/release_notes/index

For details on how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.2/html-single/install/index#installing

4. Bugs fixed (https://bugzilla.redhat.com/):

2004944 - CVE-2021-23440 nodejs-set-value: type confusion allows bypass of CVE-2019-10747
2006009 - CVE-2021-3795 semver-regex: inefficient regular expression complexity
2013652 - RHACM 2.2.10 images

5. References:

https://access.redhat.com/security/cve/CVE-2018-20673
https://access.redhat.com/security/cve/CVE-2019-5827
https://access.redhat.com/security/cve/CVE-2019-13750
https://access.redhat.com/security/cve/CVE-2019-13751
https://access.redhat.com/security/cve/CVE-2019-17594
https://access.redhat.com/security/cve/CVE-2019-17595
https://access.redhat.com/security/cve/CVE-2019-18218
https://access.redhat.com/security/cve/CVE-2019-19603
https://access.redhat.com/security/cve/CVE-2019-20838
https://access.redhat.com/security/cve/CVE-2020-12762
https://access.redhat.com/security/cve/CVE-2020-13435
https://access.redhat.com/security/cve/CVE-2020-14145
https://access.redhat.com/security/cve/CVE-2020-14155
https://access.redhat.com/security/cve/CVE-2020-16135
https://access.redhat.com/security/cve/CVE-2020-24370
https://access.redhat.com/security/cve/CVE-2020-36385
https://access.redhat.com/security/cve/CVE-2021-3200
https://access.redhat.com/security/cve/CVE-2021-3426
https://access.redhat.com/security/cve/CVE-2021-3445
https://access.redhat.com/security/cve/CVE-2021-3572
https://access.redhat.com/security/cve/CVE-2021-3580
https://access.redhat.com/security/cve/CVE-2021-3733
https://access.redhat.com/security/cve/CVE-2021-3778
https://access.redhat.com/security/cve/CVE-2021-3795
https://access.redhat.com/security/cve/CVE-2021-3796
https://access.redhat.com/security/cve/CVE-2021-3800
https://access.redhat.com/security/cve/CVE-2021-20231
https://access.redhat.com/security/cve/CVE-2021-20232
https://access.redhat.com/security/cve/CVE-2021-20266
https://access.redhat.com/security/cve/CVE-2021-20271
https://access.redhat.com/security/cve/CVE-2021-20317
https://access.redhat.com/security/cve/CVE-2021-22876
https://access.redhat.com/security/cve/CVE-2021-22898
https://access.redhat.com/security/cve/CVE-2021-22925
https://access.redhat.com/security/cve/CVE-2021-22946
https://access.redhat.com/security/cve/CVE-2021-22947
https://access.redhat.com/security/cve/CVE-2021-23440
https://access.redhat.com/security/cve/CVE-2021-23840
https://access.redhat.com/security/cve/CVE-2021-23841
https://access.redhat.com/security/cve/CVE-2021-27645
https://access.redhat.com/security/cve/CVE-2021-28153
https://access.redhat.com/security/cve/CVE-2021-33560
https://access.redhat.com/security/cve/CVE-2021-33574
https://access.redhat.com/security/cve/CVE-2021-33928
https://access.redhat.com/security/cve/CVE-2021-33929
https://access.redhat.com/security/cve/CVE-2021-33930
https://access.redhat.com/security/cve/CVE-2021-33938
https://access.redhat.com/security/cve/CVE-2021-35942
https://access.redhat.com/security/cve/CVE-2021-36084
https://access.redhat.com/security/cve/CVE-2021-36085
https://access.redhat.com/security/cve/CVE-2021-36086
https://access.redhat.com/security/cve/CVE-2021-36087
https://access.redhat.com/security/cve/CVE-2021-37750
https://access.redhat.com/security/cve/CVE-2021-42574
https://access.redhat.com/security/cve/CVE-2021-43267
https://access.redhat.com/security/cve/CVE-2021-43527
https://access.redhat.com/security/updates/classification/#low

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=VHYj
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=RawW
-----END PGP SIGNATURE-----