exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2022-7201-01

Red Hat Security Advisory 2022-7201-01
Posted Nov 2, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-7201-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.12. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2020-35525, CVE-2020-35527, CVE-2022-0494, CVE-2022-1353, CVE-2022-23816, CVE-2022-23825, CVE-2022-2509, CVE-2022-2588, CVE-2022-26945, CVE-2022-29900, CVE-2022-29901, CVE-2022-30321, CVE-2022-30322, CVE-2022-30323
SHA-256 | 6d28e160aebd967897f3d87e1e5bfd567b29c6dba8e6d1fe4a5120cd1a1c659b

Red Hat Security Advisory 2022-7201-01

Change Mirror Download
Hash: SHA256

Red Hat Security Advisory

Synopsis: Important: OpenShift Container Platform 4.11.12 security update
Advisory ID: RHSA-2022:7201-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2022:7201
Issue date: 2022-11-02
CVE Names: CVE-2020-35525 CVE-2020-35527 CVE-2022-0494
CVE-2022-1353 CVE-2022-2509 CVE-2022-2588
CVE-2022-3515 CVE-2022-23816 CVE-2022-23825
CVE-2022-26945 CVE-2022-29900 CVE-2022-29901
CVE-2022-30321 CVE-2022-30322 CVE-2022-30323
CVE-2022-32742 CVE-2022-37434 CVE-2022-40674
1. Summary:

Red Hat OpenShift Container Platform release 4.11.12 is now available with
updates to packages and images that fix several bugs and add enhancements.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the container images for Red Hat OpenShift Container
Platform 4.11.12. See the following advisory for the RPM packages for this


Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:


Security Fix(es):

* go-getter: command injection vulnerability (CVE-2022-26945)
* go-getter: unsafe download (issue 1 of 3) (CVE-2022-30321)
* go-getter: unsafe download (issue 2 of 3) (CVE-2022-30322)
* go-getter: unsafe download (issue 3 of 3) (CVE-2022-30323)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

You may download the oc tool and use it to inspect release image metadata
as follows:

(For x86_64 architecture)

$ oc adm release info

The image digest is

(For s390x architecture)

$ oc adm release info

The image digest is

(For ppc64le architecture)

$ oc adm release info

The image digest is

(For aarch64 architecture)

$ oc adm release info

The image digest is

All OpenShift Container Platform 4.11 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available

3. Solution:

For OpenShift Container Platform 4.11 see the following documentation,
which will be updated shortly for this release, for important instructions
on how to upgrade your cluster and fully apply this asynchronous errata


Details on how to access this content are available at

4. Bugs fixed (https://bugzilla.redhat.com/):

2042826 - [SNO] the replicas of ingresscontroller/default is 2 on new installed SNO private cluster
2092839 - Downward API (annotations) is missing PCI information when using the tuning metaPlugin on SR-IOV Networks
2092918 - CVE-2022-30321 go-getter: unsafe download (issue 1 of 3)
2092923 - CVE-2022-30322 go-getter: unsafe download (issue 2 of 3)
2092925 - CVE-2022-30323 go-getter: unsafe download (issue 3 of 3)
2092928 - CVE-2022-26945 go-getter: command injection vulnerability
2099800 - Bump to kubernetes 1.24.6
2109487 - machine-controller is case sensitive which can lead to false/positive errors

5. JIRA issues fixed (https://issues.jboss.org/):

OCPBUGS-1099 - Missing $SEARCH domain in /etc/resolve.conf for OCP v4.9.31 cluster
OCPBUGS-1346 - OpenStack UPI scripts do not create server group for Computes
OCPBUGS-1658 - Whereabouts should allow non default interfaces to Pod IP list [backport 4.11]
OCPBUGS-1713 - Kuryr-Controller Restarting on KuryrPort with missing pod
OCPBUGS-1955 - [4.11] Dual stack cluster fails on installation when multi-path routing entries exist
OCPBUGS-1972 - [IPI on Baremetal] ipv6 support issue in metal3-httpd
OCPBUGS-1984 - Install Helm chart form doesn't allow the user select a specific version
OCPBUGS-2011 - [4.11] ironic clear_job_queue and reset_idrac pending issues
OCPBUGS-2014 - CI: Backend unit tests fails because devfile registry was updated (mock response)
OCPBUGS-2042 - [2102088] 4.11 CatalogSourcesUnhealthy error in subscription When upgrading ptp-operator
OCPBUGS-2046 - Remove policy/v1beta1 in 4.11 and later
OCPBUGS-2050 - [release-4.11] DNS operator does not reconcile the openshift-dns namespace
OCPBUGS-2092 - Use floating tags in golang imagestream
OCPBUGS-2112 - [release-4.11] Address e2e failures due to pod security
OCPBUGS-2113 - [4.11] etcd and kube-apiserver pods get restarted due to failed liveness probes while deleting/re-creating pods on SNO
OCPBUGS-2140 - member loses rights after some other user login in openid / group sync
OCPBUGS-2293 - CVO skips reconciling the installed optional resources in the 4.11 to 4.12 upgrade
OCPBUGS-2320 - [release-4.11] Remove namespace and name from gathered DVO metrics
OCPBUGS-2451 - e2e tests: Installs Red Hat Integration - 3scale operator test is failing due to change of Operator name
OCPBUGS-2528 - dns-default pod missing "target.workload.openshift.io/management:" annotation
OCPBUGS-2606 - [release-4.11] go.mod should beworking with golang-1.17 and golang-1.18
OCPBUGS-2616 - e2e-gcp-builds is permafailing
OCPBUGS-2626 - Worker creation fails within provider networks (as primary and secondary)
OCPBUGS-2640 - prometheus-k8s-0 ends in CrashLoopBackOff with evel=error err="opening storage failed: /prometheus/chunks_head/000002: invalid magic number 0" on SNO after hard reboot tests
OCPBUGS-2658 - [4.11] VPA E2Es fail due to CSV name mismatch
OCPBUGS-2766 - 'oc login' should be robust in the face of gather failures
OCPBUGS-2780 - Import: Advanced option sentence is splited into two parts and headlines has no padding
OCPBUGS-449 - KubeDaemonSetRolloutStuck alert using incorrect metric in 4.9 and 4.10
OCPBUGS-526 - Prerelease report bug link should be updated to JIRA instead of Bugzilla
OCPBUGS-668 - Prefer local dns does not work expectedly on OCPv4.11
OCPBUGS-673 - crio occasionally fails to start during deployment
OCPBUGS-689 - [2112237] [ Cluster storage Operator 4.x(10/11) ] DefaultStorageClassController report fake message "No default StorageClass for this platform" on Alicloud, IBM
OCPBUGS-744 - [4.11] Spoke BMH stuck ?provisioning? after changing a BIOS attribute via the converged workflow
OCPBUGS-947 - [4.11] Rebase openshift/etcd 4.11 onto 3.5.5
OCPBUGS-955 - [2087981] PowerOnVM_Task is deprecated use PowerOnMultiVM_Task for DRS ClusterRecommendation

6. References:


7. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
Version: GnuPG v1

RHSA-announce mailing list
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By