Exploit/Advisories no image

Published on September 9th, 2021 📆 | 3559 Views ⚑

0

Red Hat Security Advisory 2021-3454-01 – Torchsec


iSpeech

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Low: Red Hat Advanced Cluster Management 2.3.2 security and bug fix update
Advisory ID: RHSA-2021:3454-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3454
Issue date: 2021-09-07
CVE Names: CVE-2019-20149 CVE-2020-27777 CVE-2021-3609
CVE-2021-22543 CVE-2021-22555 CVE-2021-27218
CVE-2021-29154 CVE-2021-29650 CVE-2021-31535
CVE-2021-32399 CVE-2021-33195 CVE-2021-33197
CVE-2021-33198 CVE-2021-34558
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.3.2 General
Availability release images, which fix bugs and security issues.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.3.2 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs and security issues. See
the following Release Notes documentation, which will be updated shortly
for this release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.3/html/release_notes/

Security:

* nodejs-kind-of: ctorName in index.js allows external user input to
overwrite certain internal attributes (CVE-2019-20149)

Bugs:

* RHACM 2.3.2 images (BZ# 1991623)





3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.3/html-single/install/index#installing

4. Bugs fixed (https://bugzilla.redhat.com/):

1959721 - CVE-2019-20149 nodejs-kind-of: ctorName in index.js allows external user input to overwrite certain internal attributes
1991623 - RHACM 2.3.2 images

5. References:

https://access.redhat.com/security/cve/CVE-2019-20149
https://access.redhat.com/security/cve/CVE-2020-27777
https://access.redhat.com/security/cve/CVE-2021-3609
https://access.redhat.com/security/cve/CVE-2021-22543
https://access.redhat.com/security/cve/CVE-2021-22555
https://access.redhat.com/security/cve/CVE-2021-27218
https://access.redhat.com/security/cve/CVE-2021-29154
https://access.redhat.com/security/cve/CVE-2021-29650
https://access.redhat.com/security/cve/CVE-2021-31535
https://access.redhat.com/security/cve/CVE-2021-32399
https://access.redhat.com/security/cve/CVE-2021-33195
https://access.redhat.com/security/cve/CVE-2021-33197
https://access.redhat.com/security/cve/CVE-2021-33198
https://access.redhat.com/security/cve/CVE-2021-34558
https://access.redhat.com/security/updates/classification/#low

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=TOrS
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Source link

Tagged with:



Comments are closed.