exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2023-1327-01

Red Hat Security Advisory 2023-1327-01
Posted May 17, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-1327-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.0.

tags | advisory
systems | linux, redhat
advisories | CVE-2022-2990, CVE-2022-3259, CVE-2022-41717, CVE-2022-41723, CVE-2022-41724, CVE-2022-41725, CVE-2023-0056, CVE-2023-0229, CVE-2023-0778, CVE-2023-25577, CVE-2023-25725
SHA-256 | 73d153096202874a8cfb1a557a480fa67fb9a71dac3d3657403eddefd96eedc6

Red Hat Security Advisory 2023-1327-01

Change Mirror Download
Hash: SHA256

Red Hat Security Advisory

Synopsis: Moderate: OpenShift Container Platform 4.13.0 security update
Advisory ID: RHSA-2023:1327-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2023:1327
Issue date: 2023-05-17
CVE Names: CVE-2022-2990 CVE-2022-3259 CVE-2022-41717
CVE-2022-41723 CVE-2022-41724 CVE-2022-41725
CVE-2023-0056 CVE-2023-0229 CVE-2023-0778
CVE-2023-25577 CVE-2023-25725
1. Summary:

Red Hat OpenShift Container Platform release 4.13.0 is now available with
updates to packages and images that fix several bugs and add enhancements.

This release includes a security update for Red Hat OpenShift Container
Platform 4.13.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.

This advisory contains the RPM packages for Red Hat OpenShift Container
Platform 4.13.0. See the following advisory for the container images for
this release:


Security Fix(es):

* golang: net/http: excessive memory growth in a Go server accepting HTTP/2
requests (CVE-2022-41717)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* [LSO]Error message about "ErrorFindingMatchingDisk" is not clear for cr
localvolume when no volume attached to worker (BZ#2053505)

All OpenShift Container Platform 4.13 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift CLI (oc)
or web console. Instructions for upgrading a cluster are available at

3. Solution:

For OpenShift Container Platform 4.13 see the following documentation,
which will be updated shortly for this release, for important instructions
on how to upgrade your cluster and fully apply this asynchronous errata


4. Bugs fixed (https://bugzilla.redhat.com/):

2053505 - [LSO]Error message about "ErrorFindingMatchingDisk" is not clear for cr localvolume when no volume attached to worker
2161274 - CVE-2022-41717 golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests

5. JIRA issues fixed (https://issues.jboss.org/):

OCPBUGS-10381 - [4.13] vDPA vf cannot be created
OCPBUGS-10702 - Fixing Topology DS pods startup
OCPBUGS-10729 - NodeFeatureDiscovery CR Status is not populated/updated anymore
OCPBUGS-10782 - Fixing the the release manifests directory to point to stable
OCPBUGS-10896 - CNF Upstream MultiNetworkPolicy SR-IOV integration backport 4.13
OCPBUGS-11065 - Pod annotaion key k8s.v1.cni.cncf.io/networks-status is changed
OCPBUGS-3057 - SR-IOV | Connectivity doesn't work with iPv6+static mac on top of i40e driver
OCPBUGS-3624 - End2End tests fail due to lack of Pod Security Admission
OCPBUGS-3671 - Update image version to 4.12 in cluster-nfd-operator github repo config/manifests/bases/nfd.clusterserviceversion.yaml
OCPBUGS-3679 - NFD cluster-nfd-operator make image support for arm64 deployment from github repo needs Dockerfile updates
OCPBUGS-3682 - Allow multiple NFD CR in the cluster
OCPBUGS-3683 - Allow multiple NFD CR in the cluster
OCPBUGS-3689 - NFD does not properly detect AMD processors
OCPBUGS-3707 - NFD operator default namespace openshift-nfd needs specific pod security labels added for OCP 4.12
OCPBUGS-3745 - Replace deprecated go get in Makefile
OCPBUGS-3747 - Changing kustomize version
OCPBUGS-3815 - Update skipper configuration in NFD operator
OCPBUGS-3838 - Adding local ARM compilation/build configuration
OCPBUGS-3906 - Fix bundle for release-4.12
OCPBUGS-396 - LSO should warn that diskmaker can't run because of taints
OCPBUGS-4066 - fix operator naming convention
OCPBUGS-4346 - fix operator naming convention
OCPBUGS-4462 - fix incorrect format of old skipRange
OCPBUGS-4722 - update sriov csv to 4.13 from 4.12
OCPBUGS-5178 - BF2 is not converted to nic mode after applied converting machineConfig
OCPBUGS-5293 - Current State api call for os-clock-state creates nil pointer-Dual Nic
OCPBUGS-5377 - Multiple times switching slave port to fault causes the port state to remain in HOLDOVER
OCPBUGS-5822 - NFD topologyupdater functionality missing on OCP 4.12 when deploying NFD from bundle
OCPBUGS-6184 - Update 4.13 sriov-network-device-plugin image to be consistent with ART
OCPBUGS-701 - SR-IOV VFs may get reseted after being allocated by other pods
OCPBUGS-7826 - Multi node http service support not working for consumer
OCPBUGS-7856 - [4.13] ovnkube pod crashed after enable ovs hardware offload in baremetal cluster

6. References:


7. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
Version: GnuPG v1

RHSA-announce mailing list
Login or Register to add favorites

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    8 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By