what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2023-0561-01

Red Hat Security Advisory 2023-0561-01
Posted Feb 9, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-0561-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-4238
SHA-256 | 5d066e8584377e9441db37c290eb0e0aa8f23d06003d490e4f765d95691dcafe

Red Hat Security Advisory 2023-0561-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: OpenShift Container Platform 4.10.51 security update
Advisory ID: RHSA-2023:0561-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2023:0561
Issue date: 2023-02-08
CVE Names: CVE-2021-4238
=====================================================================

1. Summary:

Red Hat OpenShift Container Platform release 4.10.51 is now available with
updates to packages and images that fix several bugs and add enhancements.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

Security Fix(es):

* goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as
random as they should be (CVE-2021-4238)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

For OpenShift Container Platform 4.10 see the following documentation,
which will be updated shortly for this release, for important instructions
on how to upgrade your cluster and fully apply this asynchronous errata
update:

https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html

You can download the oc tool and use it to inspect release image metadata
for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests
can be found at
https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.

The sha values for the release are:

(For x86_64 architecture)
The image digest is
sha256:d23a3b88ece36f741923552904b730c5452db698c7678cf65181fefb62ea5e2f

(For s390x architecture)
The image digest is
sha256:e27b9ca8076cc084528319a8dbf567841c7a970da95cf03bce4b724d58b70e52

(For ppc64le architecture)
The image digest is
sha256:fdbd611813766c4f5c2830610ba18c1ea40680db6ba30ce930aeccc9d7692376

(For aarch64 architecture)
The image digest is
sha256:fe5f112762feb15fcd6d9aec3de12a071bff114f18f15e5fd470a1ea64b0f8c7

All OpenShift Container Platform 4.10 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift CLI (oc)
or web console. Instructions for upgrading a cluster are available at
https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html.

4. Bugs fixed (https://bugzilla.redhat.com/):

2092501 - [4.10z] OCP 4.10 nightly build will fail to install if multiple NICs are defined on KVM nodes
2156729 - CVE-2021-4238 goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be

5. JIRA issues fixed (https://issues.jboss.org/):

OCPBUGS-1525 - package-server-manager does not migrate packageserver CSV from v0.17.0 to v0.18.3 on OCP 4.8 -> 4.9 upgrade
OCPBUGS-1987 - Insight Operator keeps rebooting on Openshift 4.10.18 in disconnected environment
OCPBUGS-5345 - WriteRequestBodies audit profile records routes/status events at RequestResponse level
OCPBUGS-5831 - Empty/missing node-sizing SYSTEM_RESERVED_ES parameter can result in kubelet not starting
OCPBUGS-5895 - [vsphere-csi-driver-operator] CSI cloud.conf doesn't list multiple datacenters when specified
OCPBUGS-5929 - [4.10] nodeport not reachable port connection timeout
OCPBUGS-5950 - wal: max entry size limit exceeded
OCPBUGS-5990 - [4.10] unit test data race with egress ip tests
OCPBUGS-6091 - MetalLB tries to process a service with loadbalancer class set
OCPBUGS-6645 - [release-4.10] openshift4/ose-jenkins:v4.10.0 run script throws too many arguments error
OCPBUGS-6736 - [2072601] ovn-nbctl.log is never rotated

6. References:

https://access.redhat.com/security/cve/CVE-2021-4238
https://access.redhat.com/security/updates/classification/#important

7. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBY+QTW9zjgjWX9erEAQh/4g//eom28L/8Jcq+/dBwO/znzEbVoqUt7AH4
emVq0U7kscTkruESaK3FtnonqUa36cUwiQ9YHhkVRAbTjO580WFKSmzAXhC3unxl
+cupZRzPZZnv+ZKvu8A0Wtp8q1k4uGrZnjHkR7+L9CNWAUhmXvL0Tw1op2/gIPdN
rlexFG6Gg/ZbsdtAoyVT4hFM1UonKOykFKCG94IMeR5cpoLX3uyBb3u+tWobYBMj
E1WYx9poqLhjPhwQa/wZ0xRj57GK2Kun5qH79Eeip6yabwHgfQzxH0knq7/kDGMj
O862SZNWJZY+GLILgxv3uQ13I2mnBvanaVRBurUek6oTXYEBq0E5iT1txWzgda5x
BypMw9NsxcfMGMNey7DYhbX49GUGgB3t8/S0Uufc6TD6Fnym3BjOJh7YTl08wedm
3IDyyvadxQfdItwaaEMfr2Ls08LcaNurU3vajl8q76xQ5TcZp0HYF1emkofRb3gM
uUE+CW7CWzG0U9pUBqDuu0zOUIX79ovJivWmxTqWWmxJmVskWoXYkUQGjlebHC8K
TFvH1r1CFzr9uvArzIgqBCWi+988bf14ZkgeuLi/lEu1i/kWPy8XoH+k6fgYRf0C
9lY1WvBxpF4u8Df3pKiQ4ffvMp1Id2z2Q9xHDWJpS6bmDiTvMm6h6kBYMH6s4GL4
H+Fv9nSvCAg=
=EuoB
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close