-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.4555
  Red Hat Advanced Cluster Management 2.5.2 security fixes and bug fixes
                             14 September 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat Advanced Cluster Management
Publisher:         Red Hat
Operating System:  Red Hat
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-36067 CVE-2022-32250 CVE-2022-32208
                   CVE-2022-32206 CVE-2022-31129 CVE-2022-29154
                   CVE-2022-2526 CVE-2022-2097 CVE-2022-2068
                   CVE-2022-1927 CVE-2022-1897 CVE-2022-1785
                   CVE-2022-1586 CVE-2022-1292 CVE-2022-1012

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2022:6507

Comment: CVSS (Max):  10.0 CVE-2022-36067 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
         CVSS Source: Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Critical: Red Hat Advanced Cluster Management 2.5.2 security fixes and bug fixes
Advisory ID:       RHSA-2022:6507-01
Product:           Red Hat ACM
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:6507
Issue date:        2022-09-13
CVE Names:         CVE-2022-1012 CVE-2022-1292 CVE-2022-1586 
                   CVE-2022-1785 CVE-2022-1897 CVE-2022-1927 
                   CVE-2022-2068 CVE-2022-2097 CVE-2022-2526 
                   CVE-2022-29154 CVE-2022-31129 CVE-2022-32206 
                   CVE-2022-32208 CVE-2022-32250 CVE-2022-36067 
=====================================================================

1. Summary:

Red Hat Advanced Cluster Management for Kubernetes 2.5.2 General
Availability release images, which fix security issues and bugs.

Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE links in the References section.

2. Description:

Red Hat Advanced Cluster Management for Kubernetes 2.5.2 images

Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single consoleâ\x{128}\x{148}with security policy built in.

This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/

Security fixes:

* moment: inefficient parsing algorithim resulting in DoS (CVE-2022-31129)
* vm2: Sandbox Escape in vm2 (CVE-2022-36067)

Bug fixes:

* Submariner Globalnet e2e tests failed on MTU between On-Prem to Public
clusters (BZ# 2074547)

* OCP 4.11 - Install fails because of: pods
"management-ingress-63029-5cf6789dd6-" is forbidden: unable to validate
against any security context constrain (BZ# 2082254)

* subctl gather fails to gather libreswan data if CableDriver field is
missing/empty in Submariner Spec (BZ# 2083659)

* Yaml editor for creating vSphere cluster moves to next line after typing
(BZ# 2086883)

* Submariner addon status doesn't track all deployment failures (BZ#
2090311)

* Unable to deploy Hypershift operator on MCE hub using ManagedClusterAddOn
without including s3 secret (BZ# 2091170)

* After switching to ACM 2.5 the managed clusters log "unable to create
ClusterClaim" errors (BZ# 2095481)

* Enforce failed and report the violation after modified memory value in
limitrange policy (BZ# 2100036)

* Creating an application fails with "This application has no subscription
match selector (spec.selector.matchExpressions)" (BZ# 2101577)

* Inconsistent cluster resource statuses between "All Subscription"
topology and individual topologies (BZ# 2102273)

* managed cluster is in "unknown" state for 120 mins after OADP restore

* RHACM 2.5.2 images (BZ# 2104553)

* Subscription UI does not allow binding to label with empty value (BZ#
2104961)

* Upgrade to 2.5.1 from 2.5.0 fails due to missing Subscription CRD (BZ#
2106069)

* Region information is not available for Azure cloud in managedcluster CR
(BZ# 2107134)

* cluster uninstall log points to incorrect container name (BZ# 2107359)

* ACM shows wrong path for Argo CD applicationset git generator (BZ#
2107885)

* Single node checkbox not visible for 4.11 images (BZ# 2109134)

* Unable to deploy hypershift cluster when enabling
validate-cluster-security (BZ# 2109544)

* Deletion of Application (including app related resources) from the
console fails to delete PlacementRule for the application (BZ# 20110026)

* After the creation by a policy of job or deployment (in case the object
is missing)ACM is trying to add new containers instead of updating (BZ#
2117728)

* pods in CrashLoopBackoff on 3.11 managed cluster (BZ# 2122292)

* ArgoCD and AppSet Applications do not deploy to local-cluster (BZ#
2124707)

3. Solution:

For Red Hat Advanced Cluster Management for Kubernetes, see the following
documentation, which will be updated shortly for this release, for
important
instructions about installing this release:

https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing

4. Bugs fixed (https://bugzilla.redhat.com/):

2074547 - Submariner Globalnet e2e tests failed on MTU between On-Prem to Public clusters
2082254 - OCP 4.11 - Install fails because of: pods "management-ingress-63029-5cf6789dd6-" is forbidden: unable to validate against any security context constraint
2083659 - subctl gather fails to gather libreswan data if CableDriver field is missing/empty in Submariner Spec
2086883 - Yaml editor for creating vSphere cluster moves to next line after typing
2090311 - Submariner addon status doesn't track all deployment failures
2091170 - Unable to deploy Hypershift operator on MCE hub using ManagedClusterAddOn without including s3 secret
2095481 - After switching to ACM 2.5 the managed clusters log "unable to create ClusterClaim" errors
2100036 - Enforce failed and report the violation after modified memory value in limitrange policy
2101577 - Creating an application fails with "This application has no subscription match selector (spec.selector.matchExpressions)"
2102273 - Inconsistent cluster resource statuses between "All Subscription" topology and individual topologies
2103653 - managed cluster is in "unknown" state for 120 mins after OADP restore
2104553 - RHACM 2.5.2 images
2104961 - Subscription UI does not allow binding to label with empty value
2105075 - CVE-2022-31129 moment: inefficient parsing algorithm resulting in DoS
2106069 - Upgrade to 2.5.1 from 2.5.0 fails due to missing Subscription CRD
2107134 - Region information is not available for Azure cloud in managedcluster CR
2107359 - cluster uninstall log points to incorrect container name
2107885 - ACM shows wrong path for Argo CD applicationset git generator
2109134 - Single node checkbox not visible for 4.11 images
2110026 - Deletion of Application (including app related resources) from the console fails to delete PlacementRule for the application
2117728 - After the creation by a policy of job or deployment (in case the object is missing)ACM is trying to add new containers instead of updating
2122292 - pods in CrashLoopBackoff on 3.11 managed cluster
2124707 - ArgoCD and AppSet Applications do not deploy to local-cluster
2124794 - CVE-2022-36067 vm2:  Sandbox Escape in vm2

5. References:

https://access.redhat.com/security/cve/CVE-2022-1012
https://access.redhat.com/security/cve/CVE-2022-1292
https://access.redhat.com/security/cve/CVE-2022-1586
https://access.redhat.com/security/cve/CVE-2022-1785
https://access.redhat.com/security/cve/CVE-2022-1897
https://access.redhat.com/security/cve/CVE-2022-1927
https://access.redhat.com/security/cve/CVE-2022-2068
https://access.redhat.com/security/cve/CVE-2022-2097
https://access.redhat.com/security/cve/CVE-2022-2526
https://access.redhat.com/security/cve/CVE-2022-29154
https://access.redhat.com/security/cve/CVE-2022-31129
https://access.redhat.com/security/cve/CVE-2022-32206
https://access.redhat.com/security/cve/CVE-2022-32208
https://access.redhat.com/security/cve/CVE-2022-32250
https://access.redhat.com/security/cve/CVE-2022-36067
https://access.redhat.com/security/updates/classification/#critical

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=y1WG
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=4d5q
-----END PGP SIGNATURE-----