-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: OpenShift Container Platform 4.10.51 security update Advisory ID: RHSA-2023:0561-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2023:0561 Issue date: 2023-02-08 CVE Names: CVE-2021-4238 ===================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.10.51 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Security Fix(es): * goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be (CVE-2021-4238) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html You can download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests can be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags. The sha values for the release are: (For x86_64 architecture) The image digest is sha256:d23a3b88ece36f741923552904b730c5452db698c7678cf65181fefb62ea5e2f (For s390x architecture) The image digest is sha256:e27b9ca8076cc084528319a8dbf567841c7a970da95cf03bce4b724d58b70e52 (For ppc64le architecture) The image digest is sha256:fdbd611813766c4f5c2830610ba18c1ea40680db6ba30ce930aeccc9d7692376 (For aarch64 architecture) The image digest is sha256:fe5f112762feb15fcd6d9aec3de12a071bff114f18f15e5fd470a1ea64b0f8c7 All OpenShift Container Platform 4.10 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.10/updating/updating-cluster-cli.html. 4. Bugs fixed (https://bugzilla.redhat.com/): 2092501 - [4.10z] OCP 4.10 nightly build will fail to install if multiple NICs are defined on KVM nodes 2156729 - CVE-2021-4238 goutils: RandomAlphaNumeric and CryptoRandomAlphaNumeric are not as random as they should be 5. JIRA issues fixed (https://issues.jboss.org/): OCPBUGS-1525 - package-server-manager does not migrate packageserver CSV from v0.17.0 to v0.18.3 on OCP 4.8 -> 4.9 upgrade OCPBUGS-1987 - Insight Operator keeps rebooting on Openshift 4.10.18 in disconnected environment OCPBUGS-5345 - WriteRequestBodies audit profile records routes/status events at RequestResponse level OCPBUGS-5831 - Empty/missing node-sizing SYSTEM_RESERVED_ES parameter can result in kubelet not starting OCPBUGS-5895 - [vsphere-csi-driver-operator] CSI cloud.conf doesn't list multiple datacenters when specified OCPBUGS-5929 - [4.10] nodeport not reachable port connection timeout OCPBUGS-5950 - wal: max entry size limit exceeded OCPBUGS-5990 - [4.10] unit test data race with egress ip tests OCPBUGS-6091 - MetalLB tries to process a service with loadbalancer class set OCPBUGS-6645 - [release-4.10] openshift4/ose-jenkins:v4.10.0 run script throws too many arguments error OCPBUGS-6736 - [2072601] ovn-nbctl.log is never rotated 6. References: https://access.redhat.com/security/cve/CVE-2021-4238 https://access.redhat.com/security/updates/classification/#important 7. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY+QTW9zjgjWX9erEAQh/4g//eom28L/8Jcq+/dBwO/znzEbVoqUt7AH4 emVq0U7kscTkruESaK3FtnonqUa36cUwiQ9YHhkVRAbTjO580WFKSmzAXhC3unxl +cupZRzPZZnv+ZKvu8A0Wtp8q1k4uGrZnjHkR7+L9CNWAUhmXvL0Tw1op2/gIPdN rlexFG6Gg/ZbsdtAoyVT4hFM1UonKOykFKCG94IMeR5cpoLX3uyBb3u+tWobYBMj E1WYx9poqLhjPhwQa/wZ0xRj57GK2Kun5qH79Eeip6yabwHgfQzxH0knq7/kDGMj O862SZNWJZY+GLILgxv3uQ13I2mnBvanaVRBurUek6oTXYEBq0E5iT1txWzgda5x BypMw9NsxcfMGMNey7DYhbX49GUGgB3t8/S0Uufc6TD6Fnym3BjOJh7YTl08wedm 3IDyyvadxQfdItwaaEMfr2Ls08LcaNurU3vajl8q76xQ5TcZp0HYF1emkofRb3gM uUE+CW7CWzG0U9pUBqDuu0zOUIX79ovJivWmxTqWWmxJmVskWoXYkUQGjlebHC8K TFvH1r1CFzr9uvArzIgqBCWi+988bf14ZkgeuLi/lEu1i/kWPy8XoH+k6fgYRf0C 9lY1WvBxpF4u8Df3pKiQ4ffvMp1Id2z2Q9xHDWJpS6bmDiTvMm6h6kBYMH6s4GL4 H+Fv9nSvCAg= =EuoB -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce