Thursday, March 4, 2021

Red Hat Security Advisory 2021-0719-01

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat Advanced Cluster Management 2.0.8 security and bug fix update
Advisory ID: RHSA-2021:0719-01
Product: Red Hat ACM
Advisory URL: https://access.redhat.com/errata/RHSA-2021:0719
Issue date: 2021-03-03
Keywords: management cluster Kubernetes
CVE Names: CVE-2020-10543 CVE-2020-10878 CVE-2020-12723
CVE-2020-14351 CVE-2020-15436 CVE-2020-25705
CVE-2020-29661 CVE-2020-35513 CVE-2021-3121
CVE-2021-20230
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.0.8 General
Availability release, which fixes bugs and security issues.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.0.8 images.

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which resolve some security issues and bugs. See
the following Release Notes documentation, which will be updated shortly
for this release, for details about this
release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.0/html/release_notes/

Security fixes:

* multicloud-operators-foundation: gogo/protobuf:
plugin/unmarshal/unmarshal.go lacks certain index validation
(CVE-2021-3121)

* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index
validation (CVE-2021-3121)

For more details about the security issue, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug fix:

* RHACM 2.0.8 images (BZ #1915461)

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana
gement_for_kubernetes/2.0/html-single/install/index#installing

4. Bugs fixed (https://bugzilla.redhat.com/):

1915461 - RHACM 2.0.8 images
1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation

5. References:

https://access.redhat.com/security/cve/CVE-2020-10543
https://access.redhat.com/security/cve/CVE-2020-10878
https://access.redhat.com/security/cve/CVE-2020-12723
https://access.redhat.com/security/cve/CVE-2020-14351
https://access.redhat.com/security/cve/CVE-2020-15436
https://access.redhat.com/security/cve/CVE-2020-25705
https://access.redhat.com/security/cve/CVE-2020-29661
https://access.redhat.com/security/cve/CVE-2020-35513
https://access.redhat.com/security/cve/CVE-2021-3121
https://access.redhat.com/security/cve/CVE-2021-20230
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/security/cve/CVE-2021-3121

6. Contact:

The Red Hat security contact is <[email protected]>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYEA2htzjgjWX9erEAQjOpQ//VxAhLbuMApVkRHwdeGpDaH2xjS9PKjUf
o7xHj9VssEVfOu/C+ABscpSgCyg1cQ3ofTOWApHSKoWiH0yBxersPnh0eE/PTA3x
6zxPnP0nlHsS1Gb11ilmfD2dxHTc/MyNRdFWL+TrMFC681CNYCVT4DsxPMqvdTl0
rtumpdc2bcAnH+1+CG760e/9FKjzpOIgU93jZ84RMgBp0RUVGKH/uFQRc6q9lNAo
nyAqoHPBjc78XXLM5nt8DDGf7LyV1teWYSo8GlJ6Yk8F3A9S1DZtTx9gWzmFffjF
tjAoLOYcwVVLfAr6B7YYwomPEKKQm5OANhsX9Xcqg6EgFQ7GW+MA5IsiUvFSLKSK
Z5GyPVkZQflw4YrcGq7zYRSAh9ldQkqfKzddqL3aQD/7jeTxBAAWHf9gPXj7QIju
38dr0spPQLMhzaQ0CgzzDcF9NN67d5UL5SsLiZuOGsmrAT6kzIGYAXA8u4L8LuvS
w48Z551hj9twOnZADWrowT/MKIw/K8h3S+fwcUF9zKNhC1+kdhn9ElpuX/nKNZQw
JsKo8X5nKWpE7SLpg7z1lrgyZb6S0zF9ZKVTDWkZyyEnrErdFUse9qlIT+SH8ZSY
I4BShnVoRMVLfHxAdlnRUcVsLD+CGtnve8j3LsEtp31UVoDqNipgCcyiULZMkfOI
L+MGJVA4IYI=
=XDxY
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce
 

Copyright © 2021 Vulnerability Database | Cyber Details™

thank you Templateism for the design - You should have written the code a little more complicated - Nothing Encrypted anymore