what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2023-4287-01

Red Hat Security Advisory 2023-4287-01
Posted Jul 27, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-4287-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-24736, CVE-2023-1667, CVE-2023-2283, CVE-2023-24329, CVE-2023-26604, CVE-2023-3089
SHA-256 | a75172f933e219fbd1aa1cf9b0907e6aa8d24bc3d9ee8ea4185026c5823cbd75

Red Hat Security Advisory 2023-4287-01

Change Mirror Download
Hash: SHA256

Red Hat Security Advisory

Synopsis: Moderate: Red Hat OpenShift Data Foundation 4.12.5 security and bug fix update
Advisory ID: RHSA-2023:4287-01
Product: Red Hat OpenShift Data Foundation
Advisory URL: https://access.redhat.com/errata/RHSA-2023:4287
Issue date: 2023-07-26
CVE Names: CVE-2020-24736 CVE-2023-1667 CVE-2023-2283
CVE-2023-3089 CVE-2023-24329 CVE-2023-26604

1. Summary:

Updated images that fix several bugs are now available for Red Hat
OpenShift Data Foundation 4.12.5 on Red Hat Enterprise Linux 8 from Red Hat
Container Registry.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift Data Foundation is software-defined storage integrated
with and optimized for the Red Hat OpenShift Container Platform. Red Hat
OpenShift Data Foundation is a highly scalable, production-grade persistent
storage for stateful applications running in the Red Hat OpenShift
Container Platform. In addition to persistent storage, Red Hat OpenShift
Data Foundation provisions a multicloud data management service with an S3
compatible API.

Security Fix(es):

* openshift: OCP & FIPS mode (CVE-2023-3089)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* Previously, OpenShift Data Foundation was not setting up the correct user
interface (UI) plugin version in its generated `plugin-manifest.json`
during the upgrades. This resulted in OpenShift Data Foundation not showing
up the refresh pop-up because it could not detect the change in version.
With this fix, the correct plugin version is set up to enable OpenShift
Container Platform console to detect upgrades and trigger the refresh
pop-up dialog box. As a result, a refresh pop-up shows up and when clicked,
it loads the new UI content for the upgraded OpenShift Data Foundation.

* Previously, in MultiCloud Object Gateway (MCG), there was a significant
degradation in performance with read and write operations of small objects.
The degradation was because the Remote Procedure Calls (RPC) between the
MCG endpoint and the core that were required to be cached missed the cache
each time causing an RPC message between the endpoint and the core per each
With this fix, the lookup in cache is fixed so that the existing data is
found and not queried at each operation. (BZ#2215978)

* Previously, there were repeated crashes of the MultiCloud Object Gateway
(MCG) Operator because the operator collided with the updates to the
structure when it was trying to print a debug message regarding an internal
structure in the MCG Operator.
With this release, the print is fixed so that there are no collisions,
thereby avoiding the repeated crashes fo MCG Operator. (BZ#2216402)

All users of Red Hat OpenShift Data Foundation are advised to upgrade to
these updated images, which provide these bug fixes.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:


4. Bugs fixed (https://bugzilla.redhat.com/):

2210475 - When collecting Must-gather logs shows /usr/bin/gather_ceph_resources: line 341: jq: command not found
2211592 - [ODF 4.12] [GSS] unknown parameter name "FORCE_OSD_REMOVAL"
2212085 - CVE-2023-3089 openshift: OCP & FIPS mode
2213452 - Set ??maxOpenShiftVersion to block OpenShift that didn't upgrade ODF version
2214575 - ODF dashboard crashes when OCP and ODF are upgraded
2216402 - [backport to 4.12.z] noobaa-operator pod shows multiple restarts
2224246 - [Major Incident] CVE-2023-3089 mcg-operator-container: openshift: OCP & FIPS mode [openshift-data-foundation-4.12]

5. References:


6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
Version: GnuPG v1

RHSA-announce mailing list
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By