-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: OpenShift Container Platform 4.11.21 extras and security update Advisory ID: RHSA-2022:9108-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2022:9108 Issue date: 2023-01-04 CVE Names: CVE-2022-41912 ==================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.11.21 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. See the following advisory for the container images for this release: https://access.redhat.com/errata/RHSA-2022:9107 Security Fix(es): * crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements (CVE-2022-41912) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: See the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.11/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2149181 - CVE-2022-41912 crewjam/saml: Authentication bypass when processing SAML responses containing multiple Assertion elements 5. References: https://access.redhat.com/security/cve/CVE-2022-41912 https://access.redhat.com/security/updates/classification/#important 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY7VWMdzjgjWX9erEAQiBjBAAoG863udcy+0xMJjGdOyj2ulRyF46w58Z bRA2pJSCqc/Dc9dYkbDGPYwhU7RwWsC+L9SBCHqA57f3qf08qG7Z+6xpSu+aic8R DvQlzeFtHuzBgi+eEK1E1BvbC65VhT0z3IR+7J+VicxfkrEfGfPsecCIFxWrcKiB CLMBtJmgxCZpIpUMJjDOaN7PJU8R23k5ZdCiMGjaYHoWxSE23+/p7HXOvR3YT1bU Ioh0Nh9gLv0DdqP5MZhJRdYfKHclipUasdTRSPasqdqGv15jSh4XExj3JfKmMIDj lNOfkXoJ7kIK6DZEa/NNDZBwStQ0hr7zeJkW9xBq+PFSPxU9jlq14ULBMupCTYdF SafF1X5bdWlxgC/njwKxIpM8xUSop2hMIpFw4OlbOIuRXCht9GBh3KqaLjtB+HLU nU/jBkRWPGbjJRT0sOXlFYV8d28CvGurIihhJ0eN4ZAAiBiKfDA/Y1yrL6SNwBNj E03FWKjvB8N/pPvGoL3kaElRAQJC7DVTY/MCDi3sZnpxUKBZYruq2RD/zNAuiN5R U+ibqLArF9LbT7aVG7YSCplXxgCKDRIBw2fw+JWQkmBSYZMoqGxX2jgh4RIQJx9c A0PLEjcLECzV8IfDI0z0QfPOpsPUSa5ILp05W/qDvkfXoUsQyr4qPvcYDQWQ/rh+ yp8JQJpojCw=LVLE -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce