-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: Red Hat Advanced Cluster Management 2.1.12 security fixes and container updates
Advisory ID:       RHSA-2021:3949-01
Product:           Red Hat ACM
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:3949
Issue date:        2021-10-20
CVE Names:         CVE-2016-4658 CVE-2021-3653 CVE-2021-3656 
                   CVE-2021-22543 CVE-2021-22922 CVE-2021-22923 
                   CVE-2021-22924 CVE-2021-23840 CVE-2021-23841 
                   CVE-2021-32626 CVE-2021-32627 CVE-2021-32628 
                   CVE-2021-32672 CVE-2021-32675 CVE-2021-32687 
                   CVE-2021-36222 CVE-2021-37576 CVE-2021-37750 
                   CVE-2021-41099 
====================================================================
1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.1.12 General
Availability release images, which provide security fixes and update the
container images.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.1.12 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains updates to one or more container images for Red Hat
Advanced Cluster Management for Kubernetes. See the following Release Notes
documentation, which will be updated shortly for this release, for
additional details about this release:

gement_for_kubernetes/2.1/html/release_notes/

Security fixes:

* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)

* redis: Integer overflow issue with Streams (CVE-2021-32627)

* redis: Integer overflow bug in the ziplist data structure
(CVE-2021-32628)

* redis: Integer overflow issue with intsets (CVE-2021-32687)

* redis: Integer overflow issue with strings (CVE-2021-41099)

* redis: Denial of service via Redis Standard Protocol (RESP) request
(CVE-2021-32675)

* redis: Out of bounds read in lua debugger protocol parser
(CVE-2021-32672)

For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Container updates:

* RHACM 2.1.12 images (BZ# 2007489)

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

*Important:* This upgrade of Red Hat Advanced Cluster Management for
Kubernetes 
is not supported when you are running Red Hat Advanced Cluster Management
on 
Red Hat OpenShift Container Platform version 4.5. To apply this upgrade,
you 
must upgrade your OpenShift Container Platform version to 4.6, or later. 

For details on how to apply this update, refer to:

gement_for_kubernetes/2.1/html/install/installing#upgrading-by-using-the-op
erator

4. Bugs fixed (https://bugzilla.redhat.com/):

2007489 - RHACM 2.1.12 images
2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets
2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request
2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser
2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure
2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams
2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack
2011020 - CVE-2021-41099 redis: Integer overflow issue with strings

5. References:

https://access.redhat.com/security/cve/CVE-2016-4658
https://access.redhat.com/security/cve/CVE-2021-3653
https://access.redhat.com/security/cve/CVE-2021-3656
https://access.redhat.com/security/cve/CVE-2021-22543
https://access.redhat.com/security/cve/CVE-2021-22922
https://access.redhat.com/security/cve/CVE-2021-22923
https://access.redhat.com/security/cve/CVE-2021-22924
https://access.redhat.com/security/cve/CVE-2021-23840
https://access.redhat.com/security/cve/CVE-2021-23841
https://access.redhat.com/security/cve/CVE-2021-32626
https://access.redhat.com/security/cve/CVE-2021-32627
https://access.redhat.com/security/cve/CVE-2021-32628
https://access.redhat.com/security/cve/CVE-2021-32672
https://access.redhat.com/security/cve/CVE-2021-32675
https://access.redhat.com/security/cve/CVE-2021-32687
https://access.redhat.com/security/cve/CVE-2021-36222
https://access.redhat.com/security/cve/CVE-2021-37576
https://access.redhat.com/security/cve/CVE-2021-37750
https://access.redhat.com/security/cve/CVE-2021-41099
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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siEM
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-3949:01 Important: Red Hat Advanced Cluster Management

Red Hat Advanced Cluster Management for Kubernetes 2.1.12 General Availability release images, which provide security fixes and update the container images

Summary

Red Hat Advanced Cluster Management for Kubernetes 2.1.12 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in.
This advisory contains updates to one or more container images for Red Hat Advanced Cluster Management for Kubernetes. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
gement_for_kubernetes/2.1/html/release_notes/
Security fixes:
* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
* redis: Integer overflow issue with Streams (CVE-2021-32627)
* redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628)
* redis: Integer overflow issue with intsets (CVE-2021-32687)
* redis: Integer overflow issue with strings (CVE-2021-41099)
* redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675)
* redis: Out of bounds read in lua debugger protocol parser (CVE-2021-32672)
For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Container updates:
* RHACM 2.1.12 images (BZ# 2007489)



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
*Important:* This upgrade of Red Hat Advanced Cluster Management for Kubernetes is not supported when you are running Red Hat Advanced Cluster Management on Red Hat OpenShift Container Platform version 4.5. To apply this upgrade, you must upgrade your OpenShift Container Platform version to 4.6, or later.
For details on how to apply this update, refer to:
gement_for_kubernetes/2.1/html/install/installing#upgrading-by-using-the-op erator

References

https://access.redhat.com/security/cve/CVE-2016-4658 https://access.redhat.com/security/cve/CVE-2021-3653 https://access.redhat.com/security/cve/CVE-2021-3656 https://access.redhat.com/security/cve/CVE-2021-22543 https://access.redhat.com/security/cve/CVE-2021-22922 https://access.redhat.com/security/cve/CVE-2021-22923 https://access.redhat.com/security/cve/CVE-2021-22924 https://access.redhat.com/security/cve/CVE-2021-23840 https://access.redhat.com/security/cve/CVE-2021-23841 https://access.redhat.com/security/cve/CVE-2021-32626 https://access.redhat.com/security/cve/CVE-2021-32627 https://access.redhat.com/security/cve/CVE-2021-32628 https://access.redhat.com/security/cve/CVE-2021-32672 https://access.redhat.com/security/cve/CVE-2021-32675 https://access.redhat.com/security/cve/CVE-2021-32687 https://access.redhat.com/security/cve/CVE-2021-36222 https://access.redhat.com/security/cve/CVE-2021-37576 https://access.redhat.com/security/cve/CVE-2021-37750 https://access.redhat.com/security/cve/CVE-2021-41099 https://access.redhat.com/security/updates/classification/#important

Package List


Severity
Advisory ID: RHSA-2021:3949-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3949
Issued Date: : 2021-10-20
CVE Names: CVE-2016-4658 CVE-2021-3653 CVE-2021-3656 CVE-2021-22543 CVE-2021-22922 CVE-2021-22923 CVE-2021-22924 CVE-2021-23840 CVE-2021-23841 CVE-2021-32626 CVE-2021-32627 CVE-2021-32628 CVE-2021-32672 CVE-2021-32675 CVE-2021-32687 CVE-2021-36222 CVE-2021-37576 CVE-2021-37750 CVE-2021-41099

Topic

Red Hat Advanced Cluster Management for Kubernetes 2.1.12 GeneralAvailability release images, which provide security fixes and update thecontainer images.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2007489 - RHACM 2.1.12 images

2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets

2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request

2011001 - CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser

2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure

2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams

2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack

2011020 - CVE-2021-41099 redis: Integer overflow issue with strings


Related News