exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2020-5614-01

Red Hat Security Advisory 2020-5614-01
Posted Dec 21, 2020
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2020-5614-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-15862, CVE-2020-16166, CVE-2020-1971, CVE-2020-27836, CVE-2020-8177
SHA-256 | 778636deea731ea550688f490618437a9bec01f6c8696ff1bfdd7d6d0b4746ba

Red Hat Security Advisory 2020-5614-01

Change Mirror Download
Hash: SHA256

Red Hat Security Advisory

Synopsis: Important: OpenShift Container Platform 4.6.9 security and bug fix update
Advisory ID: RHSA-2020:5614-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2020:5614
Issue date: 2020-12-21
CVE Names: CVE-2020-1971 CVE-2020-8177 CVE-2020-15862
CVE-2020-16166 CVE-2020-27836
1. Summary:

Red Hat OpenShift Container Platform release 4.6.9 is now available with
updates to packages and images that fix several bugs and add enhancements.

This release also includes a security update for Red Hat OpenShift
Container Platform 4.6.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

Security Fix(es):

* cluster-ingress-operator: changes to loadBalancerSourceRanges overwritten
by operator (CVE-2020-27836)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

This advisory contains the container images for Red Hat OpenShift Container
Platform 4.6.9. See the following advisory for the RPM packages for this


Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:


This update fixes the following bugs among others:

* Previously, pre-flight installer validation for OpenShift Container
Platform on OpenStack was performed on the flavor metadata. This could
prevent installations to flavors detected as `baremetal`, which might have
the required capacity to complete the installation. This is usually caused
by OpenStack administrators not setting the appropriate metadata on their
bare metal flavors. Validations are now skipped on flavors detected as
`baremetal`, to prevent incorrect failures from being reported.

* Previously, there was a broken link on the OperatorHub install page of
the web console, which was intended to reference the cluster monitoring
documentation. This has been fixed. (BZ#1904600)

You may download the oc tool and use it to inspect release image metadata
as follows:

(For x86_64 architecture)

$ oc adm release info

The image digest is

(For s390x architecture)

$ oc adm release info

The image digest is

(For ppc64le architecture)

$ oc adm release info

The image digest is

All OpenShift Container Platform 4.6 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
- -between-minor.html#understanding-upgrade-channels_updating-cluster-between
- -minor.

3. Solution:

For OpenShift Container Platform 4.6 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:


Details on how to access this content are available at
- -cli.html.

4. Bugs fixed (https://bugzilla.redhat.com/):

1885442 - Console doesn't load in iOS Safari when using self-signed certificates
1885946 - console-master-e2e-gcp-console test periodically fail due to no Alerts found
1887551 - Unsupported access mode should not be available to select when creating pvc by aws-ebs-csi-driver(gp2-csi) from web-console
1888165 - [release 4.6] IO doesn't recognize namespaces - 2 resources with the same name in 2 namespaces -> only 1 gets collected
1888650 - Fix CVE-2015-7501 affecting agent-maven-3.5
1888717 - Cypress: Fix 'link-name' accesibility violation
1888721 - ovn-masters stuck in crashloop after scale test
1890993 - Selected Capacity is showing wrong size
1890994 - When the user clicked cancel at the Create Storage Class confirmation dialog all the data from the Local volume set goes off
1891427 - CLI does not save login credentials as expected when using the same username in multiple clusters
1891454 - EgressNetworkPolicy does not work when setting Allow rule to a dnsName
1891499 - Other machine config pools do not show during update
1891891 - Wrong detail head on network policy detail page.
1896149 - TLS secrets are not able to edit on console.
1896625 - with Serverless 1.10 version of trigger/subscription/channel/IMC is V1 as latest
1897019 - "Attach to Virtual Machine OS" button should not be visible on old clusters
1897766 - [release-4.6]Incorrect instructions in the Serverless operator and application quick starts
1898172 - installer missing permission definitions for TagResources and UntagResources when installing in existing VPC
1898302 - E2E test: Use KUBEADM_PASSWORD_FILE by default
1898746 - opm index add cannot batch add multiple bundles that use skips
1899056 - Max unavailable and Max surge value are not shown on Deployment Config Details page
1899382 - Remove TechPreview Badge from Eventing in Serverless version 1.11.0
1899728 - overview filesystem utilization of OCP is showing the wrong values
1901110 - pod donut shows incorrect information
1901871 - catalog-operator repeatedly crashes with "runtime error: index out of range [0] with length 0"
1901877 - linuxptp-daemon crash when enable debug log level [release-4.6]
1902029 - [sig-builds][Feature:Builds][valueFrom] process valueFrom in build strategy environment variables should successfully resolve valueFrom in docker build environment variables
1904014 - (release 4.6) Hostsubnet gatherer produces wrong output
1904028 - [release-4.6] The quota controllers should resync on new resources and make progress
1904065 - [release 4.6] [Openstack] HTTP_PROXY setting for NetworkManager-resolv-prepender not working
1904260 - VPA-operator has version: 1.0.0 every build
1904583 - Operator upgrades can delete existing CSV before completion
1904600 - Cluster monitoring documentation link is broken - 404 not found
1905004 - Use new packages for ipa ramdisks
1905230 - Multus errors when cachefile is not found
1905619 - [4.6.z] usbguard extension fails to install because of missing correct protobuf dependency version
1905622 - [Platform] Remove restriction on disk type selection for LocalVolumeSet
1905746 - Subscription manual approval test is flaky
1905903 - Rules in kube-apiserver.rules are taking too long and consuming too much memory for Prometheus to evaluate them
1906267 - CVE-2020-27836 cluster-ingress-operator: changes to loadBalancerSourceRanges overwritten by operator
1906416 - Errant change to lastupdatetime in copied CSV status can trigger runaway csv syncs

5. References:


6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
Version: GnuPG v1


RHSA-announce mailing list
Login or Register to add favorites

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    20 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By