-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift sandboxed containers 1.2.0 security update Advisory ID: RHSA-2022:0855-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2022:0855 Issue date: 2022-03-14 CVE Names: CVE-2021-36221 CVE-2021-44716 ==================================================================== 1. Summary: OpenShift sandboxed containers 1.2.0 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section. 2. Description: OpenShift sandboxed containers support for OpenShift Container Platform provides users with built-in support for running Kata containers as an additional, optional runtime. This advisory contains an update for OpenShift sandboxed containers with enhancements, security updates, and bug fixes. Space precludes documenting all of the updates to OpenShift sandboxed containers in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/4.10/sandboxed_containers/sandboxed-containers-release-notes.html Security Fixes: * net/http: limit growth of header canonicalization cache (CVE-2021-44716) * net/http/httputil: panic due to racy read of persistConn after handler panic (CVE-2021-36221) For more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section. 3. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://docs.openshift.com/container-platform/latest/sandboxed_containers/upgrade-sandboxed-containers.html 4. Bugs fixed (https://bugzilla.redhat.com/): 1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic 2030801 - CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache 5. JIRA issues fixed (https://issues.jboss.org/): KATA-1015 - 1.2: unused sourceImage field in KataConfig is confusing KATA-1019 - 1.2: annotations state Operator is only supported on OCP 4.8 KATA-1027 - Newer kata-containers shimv2 (from kata-2.2.0 onwards) doesn't work with OCP. KATA-1118 - Attempt to uninstall while installation is in progress blocks KATA-1134 - Metrics doesn't work with the latest runtime cgroups improvements and simplifications KATA-1183 - security warning when creating daemonset for kata-monitor KATA-1184 - MachineConfigPool kata-oc is not removed with KataConfig CRD is deleted KATA-1189 - pods for kata-monitor daemonset don't start: SCC issues KATA-1190 - Operator not reconciling when node labels are changed KATA-1195 - Error: CreateContainer failed: Permission denied (os error 13): unknown KATA-1205 - openshift-sandboxed-containers-operator namespace not labelled for kata metrics KATA-1219 - kata-monitor will forget about a kata pod if an error happens while retrieving the metrics KATA-1222 - daemonset creation fails with reconciler error KATA-1224 - wrong channels and default version in internal build KATA-1225 - upgrade from 1.1.0 to 1.2.0 failed KATA-1247 - kataconfig can't be applied due to syntax error KATA-1249 - use official pullspec for metrics daemonset as default in kataconfig CRD KATA-1288 - changes to spec.kataMonitorImage are not reconciled KATA-1334 - Unable to loop mount file based image inside Kata container KATA-1340 - runtime installation shows no progress after creating kataconfig KATA-1383 - fix RHSA-2022:0658 (cyrus-sasl) KATA-553 - Worker node is not being created when scaling up a cluster with the Kata operator installed KATA-588 - kata 2.0: stop a container spam crio logs continously KATA-817 - There are no logs coming from kata-containers agent 6. References: https://access.redhat.com/security/cve/CVE-2021-36221 https://access.redhat.com/security/cve/CVE-2021-44716 https://access.redhat.com/security/updates/classification/#moderate 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYjBXvtzjgjWX9erEAQjqww//RMCA4qDjnMLRInZJc/3rOsThXEsGG/v8 5ZRFWBfIy87MkhgiLR4MDdM2/EdOOhD27KBCZWC5mLvxM+y4GKRVR/nzYeYjf+L4 3bDg7Sx/e52yRpgMJ4Ld5EhmSwsREins6UlPlROr/O9UgDRaBBloENWCvaJr+iVN o/uO5MjmHGrnBMixP8weVDAeC5fvBVtcNHXRiqcqIRf5XauFj2GwyOdfZR6KuzMr H5M97bQa7bAYnDaeCSml+kjD3pSN/Eei+Ngj72x4kal+aQYf/lV1RCp6+BSZpTlG v4UmGz1OJlrJspdeixwp6MQ9k+qthtpZcR1+oQwuTlfqWq7KtlX+hpv77KaGU0Nx krqA5rmQJE1mNPQBcX1TbhlL+IayAAMUjG/U57k75Q8d9jFYsHtn7mCZtCcnjTei 7FxrH9cIJbzdC8Fg3FSsn0fg2ts3bVo8VFr6mLSTmnCTh0CoOkNi1VoUYmxOjnVE Qan3wK+3F2ykVssUlGBnjSwP9FIxDILKBT5e+Ty+90v3PYx3H7wGY38AbgZrYMJP SW0ha0Q+1TUcriLTgdJPHYctGWrWtINvCdZX7WuBwy1x90jz5hPz/whk31+8Ezz0 tWEyG6GBc2UxOZRBzQFVVqTZjxUUH961iGLLZEh/onvBWv9/XoFkZnlYRV4pm2EH dtS2WFZnPsg=z3KT -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce