-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: OpenShift Container Platform 4.5.33 bug fix and security update Advisory ID: RHSA-2021:0428-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2021:0428 Issue date: 2021-03-03 CVE Names: CVE-2021-3344 ==================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.5.33 is now available with updates to packages and images that fix several bugs and add enhancements. This release also includes a security update for Red Hat OpenShift Container Platform 4.5. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Security Fix(es): * openshift/builder: privilege escalation during container image builds via mounted secrets (CVE-2021-3344) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. This advisory contains the container images for Red Hat OpenShift Container Platform 4.5.33. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHSA-2021:0429 Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-rel ease-notes.html You may download the oc tool and use it to inspect release image metadata as follows: (For x86_64 architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.5.33-x86_64 The image digest is sha256:8e6b3ffc19aa6106096936733a128095646a604b69924b5cf606260d433661f0 (For s390x architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.5.33-s390x The image digest is sha256:c7085a4d27da05bd733e5ad72b74f6a1b55548badeb71ce050e88baaf4fcf575 (For ppc64le architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.5.33-ppc64le The image digest is sha256:102c2dff98f2dab4cf975a02b3cf9fa24ce1e0e10650113e94e5d07420ac10d3 All OpenShift Container Platform 4.5 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.5/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor. 3. Solution: For OpenShift Container Platform 4.5 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-rel ease-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.5/updating/updating-cluster - -cli.html. 4. Bugs fixed (https://bugzilla.redhat.com/): 1849154 - [4.5] readinessEndpoint not using trustedCA for trust validation 1877346 - KubeAPIErrorsHigh firing due to "too large resource version" 1879208 - APIServer panic'd: net/http: abort Handler 1879901 - [release 4.5] Top-level cross-platform: Fix bug in reflector not recovering from "Too large resource version" 1884195 - Possible to delete 2 masters simultaneously if kubelet unreachable 1887763 - [release 4.5] Gather MachineConfigPools 1889679 - [release 4.5] Gather top installplans and their count 1891455 - EgressNetworkPolicy does not work when setting Allow rule to a dnsName 1891545 - [release 4.5] Add ContainerRuntimeConfig gatherer 1892372 - operator pod with OLM webhooks is getting terminated and created several times during the installation 1894243 - [Backport 4.5] IO archive contains more records of than is the limit 1896079 - Package Server is in 'Cannot update' status despite properly working 1904584 - Operator upgrades can delete existing CSV before completion 1905576 - [4.5] Changing the bound token service account issuer invalids previously issued bound tokens 1905991 - [release-4.5] Detecting broken connections to the Kube API takes up to 15 minutes 1914255 - Red Hat image and crashlooping OpenShift pod collection 1916660 - AggregatedAPIDown permanently firing after removing APIService 1916859 - configs.imageregistry.operator.openshift.io cluster does not update its status fields after URL change 1918962 - [IPI on vsphere] Executing 'openshift-installer destroy cluster' leaves installer tag categories in vsphere 1920421 - Too many haproxy processes in default-router pod causing high load average 1920676 - Must-gather and inspect should put a timestamp when it started and finished into the tar 1921283 - fix MCS blocking iptables rules 1921450 - CVE-2021-3344 openshift/builder: privilege escalation during container image builds via mounted secrets 1921484 - Regression OLM uses scoped client for CRD installation 1922262 - [4.5.z] real-time kernel in RHCOS is not synchronized 1924137 - Increase initialDelaySeconds for ovs-daemons container in the ovs-node daemonset for upgrade scenarios 1924913 - A valid etcd endpoint should have the URL scheme prepended 1925678 - Placeholder bug for OCP 4.5.z rpm release 1925679 - Placeholder bug for OCP 4.5.z extras release 1925680 - Placeholder bug for OCP 4.5.z metadata release 1926564 - [release-4.5] OCP installs fail on ppc64le/s390x in the bootstrap phase 1926730 - Large number of tcp connections with shiftstack ocp cluster in about 24 hours 1928263 - catalog operator causing CPU spikes and bad etcd performance 5. References: https://access.redhat.com/security/cve/CVE-2021-3344 https://access.redhat.com/security/updates/classification/#important 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYD8XptzjgjWX9erEAQjiTQ//cejBSmO4yK1yA85OYT+YNu29jw990xZ4 4q9e/hF/JYb0k12vd8BuwM9fnQ2h7Y/blgAaY7g3bCu6mnhNPdl1WSVwwMCRtM9i ClkEBKb/Ryvrvtzve/m6TnrOsIkQdpocXQ+sYJoHMN2VkN+xnUtFamdKt8RjRoKF Ululuee1yiHlzY3W5iQ9uC3x5DcPhjfa1edlWXBj8AudJ+hlZn1orpihIMsPikno 0OGto0JWqHK2VznkCYE2bGOJcaXDX2F/JitkhdOD1E/zo0eAvtS6Nbnwckm6v04o xP3b9ce5o2O6iM7Gv4zXxSbFFblXu6/jqHvEsoHO5gD3YID/UcZP7IinTRonUxKa ol3m/oZQPL+sa6bO2UwLwr0PZfPX50iEbrNlgEKolZJ1rwspKK2X9JXEIfCLOQUh iQXm1qI2bc9n27clVgl4eJ+D+7cIfHmhu/2KEXfrMKHoMEKLVdtMLt3EcsjJNalV EgwNvgx1WOSnlsguzhkSqe1d7XTbNLs7jfAcf3sEuaNnvcd7MDnlXbNowAC3Z9SP UOx62SDcmWbn6HMNQz4+yiOEod+VF/ddwx0E7q/k1WdpZUwNrEDnNo3vQpFSqkI4 zkRZo0XTGOf/GDiW6yh8TRWEBrb1KmAyLpHRfm0KrF3KF5NQTY7fGPXm6ds4u6Bf D4HXcSrBdRE=0+JU -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce