Red Hat Security Advisory 2021-3262-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.28.
f37b42defebec364c01fe40a389041ab038a2ebaa9c66663dc7cc5a6686caeaf
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: OpenShift Container Platform 4.7.28 security update
Advisory ID: RHSA-2021:3262-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3262
Issue date: 2021-09-01
CVE Names: CVE-2021-3121 CVE-2021-3609 CVE-2021-22543
CVE-2021-22555 CVE-2021-27218
=====================================================================
1. Summary:
Red Hat OpenShift Container Platform release 4.7.28 is now available with
updates to packages and images that fix several bugs and add enhancements.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container
Platform 4.7.28. See the following advisory for the RPM packages for this
release:
https://access.redhat.com/errata/RHBA-2021:3263
Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation for details about these
changes:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel
ease-notes.html
Security Fix(es):
* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index
validation (CVE-2021-3121)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* Machine Config Operator degrades during cluster update with failed to
convert Ignition config spec v2 to v3 (BZ#1956462)
* OCP IPI Publish Internal - GCP: Load Balancer service with External
Traffic Policy as Local is not working (BZ#1971669)
* [4.7] Unable to attach Vsphere volume shows the error "failed to get
canonical path" (BZ#1973766)
* oc logs doesn't work with piepeline builds (BZ#1974264)
* "provisioned registration errors" cannot be reported (BZ#1976924)
* AWS Elastic IP permissions are incorrectly required (BZ#1981553)
* Memory consumption (container_memory_rss) steadily growing for
/system.slice/kubelet.service when FIPS enabled [ocp 4.7] (BZ#1981580)
* Problematic Deployment creates infinite number Replicasets causing etcd
to reach quota limit (BZ#1981775)
* Size of the hostname was preventing proper DNS resolution of the worker
node names (BZ#1983695)
* (release-4.7) Insights status card shows nothing when 0 issues found
(BZ#1986724)
* drop-icmp pod blocks direct SSH access to cluster nodes (BZ#1988426)
* Editing a Deployment drops annotations (BZ#1989642)
* [Kuryr][4.7] Duplicated egress rule for service network in knp object
(BZ#1990175)
* Update failed - ovn-nbctl: duplicate nexthop for the same ECMP route
(BZ#1991445)
* Unable to install a zVM hosted OCP 4.7.24 on Z Cluster based on new RHCOS
47 RHEL 8.4 based build (BZ#1992240)
* alerts: SystemMemoryExceedsReservation triggers too quickly (BZ#1992687)
* failed to start cri-o service due to /usr/libexec/crio/conmon is missing
(BZ#1993386)
* Thanos build failure: vendor/ ignored (BZ#1994123)
* Ipv6 IP addresses are not accepted for whitelisting (BZ#1994645)
* upgrade from 4.6 to 4.7 to 4.8 with mcp worker "paused=true", crio
report "panic: close of closed channel" which lead to a master Node go into
Restart loop (BZ#1994729)
* linuxptp-daemon crash on 4.8 (BZ#1995579)
* long living clusters may fail to upgrade because of an invalid conmon
path (BZ#1995810)
For more details about the security issue(s), refer to the CVE
page(s) listed in the References section.
You may download the oc tool and use it to inspect release image metadata
as follows:
(For x86_64 architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.7.28-x86_64
The image digest is
sha256:b3f38d58057a12b0477bf28971390db3e3391ce1af8ac06e35d0aa9e8d8e5966
(For s390x architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.7.28-s390x
The image digest is
sha256:30c2011f6d84b16960b981a07558f96a55e59a281449d25c5ccc778aaeb2f970
(For ppc64le architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.7.28-ppc64le
The image digest is
sha256:52ebf0db5a36434357c24a64863025730d2159a94997333f15fbe1444fa88f4f
Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster
- -between-minor.html#understanding-upgrade-channels_updating-cluster-between
- -minor
3. Solution:
For OpenShift Container Platform 4.7 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel
ease-notes.html
Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.7/updating/updating-cluster
- -cli.html
4. Bugs fixed (https://bugzilla.redhat.com/):
1863446 - [Assisted-4.5-M2] clean all does not remove ConfigMaps and PVC
1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
1956462 - Machine Config Operator degrades during cluster update with failed to convert Ignition config spec v2 to v3
1971669 - OCP IPI Publish Internal - GCP: Load Balancer service with External Traffic Policy as Local is not working
1973766 - [4.7] Unable to attach Vsphere volume shows the error "failed to get canonical path"
1974264 - oc logs doesn't work with piepeline builds
1976924 - "provisioned registration errors" cannot be reported
1981553 - AWS Elastic IP permissions are incorrectly required
1981775 - Problematic Deployment creates infinite number Replicasets causing etcd to reach quota limit
1983695 - Size of the hostname was preventing proper DNS resolution of the worker node names
1986724 - (release-4.7) Insights status card shows nothing when 0 issues found
1988426 - drop-icmp pod blocks direct SSH access to cluster nodes
1989642 - Editing a Deployment drops annotations
1990175 - [Kuryr][4.7] Duplicated egress rule for service network in knp object
1991445 - Update failed - ovn-nbctl: duplicate nexthop for the same ECMP route
1992240 - Unable to install a zVM hosted OCP 4.7.24 on Z Cluster based on new RHCOS 47 RHEL 8.4 based build
1992687 - alerts: SystemMemoryExceedsReservation triggers too quickly
1993386 - failed to start cri-o service due to /usr/libexec/crio/conmon is missing
1994123 - Thanos build failure: vendor/ ignored
1994645 - Ipv6 IP addresses are not accepted for whitelisting
1994729 - upgrade from 4.6 to 4.7 to 4.8 with mcp worker "paused=true", crio report "panic: close of closed channel" which lead to a master Node go into Restart loop
1995810 - long living clusters may fail to upgrade because of an invalid conmon path
1998112 - Networking issue with vSphere clusters running HW14 and later
5. References:
https://access.redhat.com/security/cve/CVE-2021-3121
https://access.redhat.com/security/cve/CVE-2021-3609
https://access.redhat.com/security/cve/CVE-2021-22543
https://access.redhat.com/security/cve/CVE-2021-22555
https://access.redhat.com/security/cve/CVE-2021-27218
https://access.redhat.com/security/updates/classification/#important
6. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=tCEP
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce