-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Container Platform 4.10.58 security update Advisory ID: RHSA-2023:1866-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2023:1866 Issue date: 2023-04-26 CVE Names: CVE-2022-42889 CVE-2023-25761 CVE-2023-25762 ===================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.10.58 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Container Platform 4.10 - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.58. See the following advisory for the container images for this release: https://access.redhat.com/errata/RHBA-2023:1867 Security Fix(es): * apache-commons-text: variable interpolation RCE (CVE-2022-42889) * jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin (CVE-2023-25761) * jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin (CVE-2023-25762) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html 5. Bugs fixed (https://bugzilla.redhat.com/): 2135435 - CVE-2022-42889 apache-commons-text: variable interpolation RCE 2170039 - CVE-2023-25761 jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin 2170041 - CVE-2023-25762 jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin 6. Package List: Red Hat OpenShift Container Platform 4.10: Source: cri-o-1.23.5-10.rhaos4.10.gitcc8441d.el7.src.rpm x86_64: cri-o-1.23.5-10.rhaos4.10.gitcc8441d.el7.x86_64.rpm cri-o-debuginfo-1.23.5-10.rhaos4.10.gitcc8441d.el7.x86_64.rpm Red Hat OpenShift Container Platform 4.10: Source: cri-o-1.23.5-10.rhaos4.10.gitcc8441d.el8.src.rpm jenkins-2-plugins-4.10.1681719745-1.el8.src.rpm jenkins-2.387.1.1681718871-1.el8.src.rpm aarch64: cri-o-1.23.5-10.rhaos4.10.gitcc8441d.el8.aarch64.rpm cri-o-debuginfo-1.23.5-10.rhaos4.10.gitcc8441d.el8.aarch64.rpm cri-o-debugsource-1.23.5-10.rhaos4.10.gitcc8441d.el8.aarch64.rpm noarch: jenkins-2-plugins-4.10.1681719745-1.el8.noarch.rpm jenkins-2.387.1.1681718871-1.el8.noarch.rpm ppc64le: cri-o-1.23.5-10.rhaos4.10.gitcc8441d.el8.ppc64le.rpm cri-o-debuginfo-1.23.5-10.rhaos4.10.gitcc8441d.el8.ppc64le.rpm cri-o-debugsource-1.23.5-10.rhaos4.10.gitcc8441d.el8.ppc64le.rpm s390x: cri-o-1.23.5-10.rhaos4.10.gitcc8441d.el8.s390x.rpm cri-o-debuginfo-1.23.5-10.rhaos4.10.gitcc8441d.el8.s390x.rpm cri-o-debugsource-1.23.5-10.rhaos4.10.gitcc8441d.el8.s390x.rpm x86_64: cri-o-1.23.5-10.rhaos4.10.gitcc8441d.el8.x86_64.rpm cri-o-debuginfo-1.23.5-10.rhaos4.10.gitcc8441d.el8.x86_64.rpm cri-o-debugsource-1.23.5-10.rhaos4.10.gitcc8441d.el8.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-42889 https://access.redhat.com/security/cve/CVE-2023-25761 https://access.redhat.com/security/cve/CVE-2023-25762 https://access.redhat.com/security/updates/classification/#moderate https://docs.openshift.com/container-platform/4.10/release_notes/ocp-4-10-release-notes.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZEi8VdzjgjWX9erEAQgYjA//Rd2GffwUpmol08RIdn0ITnyVf+6bmOBY wh+wA7h/PT0E/R0+BzaOZjnazmwpXQGFA4PBlfKsXDoP5H9DvRgC7pbXdnx0jzdR 0RYsiDslK+MWPCxpybNrz7ajGZ6xL8bBBwkf7Hp1qTuZ3qGpcc7kNj/Y4snqQDrf trpO79ntndk1riv3hlKPbjiruIm7GhHLHALlw/CUDU64MajUJO2FfAMUG+XrRKW7 jIHMUuVF1GDbOZ3a4dZco9UdC1kp2aNkmeBE8gMozC5XDZTKAE2UCx39nNKr01uZ 7WsvAK8ywcaJzXsgI0EG7lieeKvDF1lp7IX7S7HRmAJMFqFA/MRZgWYXDu2GJGQl ZL80WmZKDbrhpy1ETG4se6hEN2TSAuc3Zj49tz7NdcDStCOzy5twwUnOxctIpRUE TmSWwRvMH2koiYgwuqEmbIR0B6lS+xoWhGAQMaoNbJcepyXOWIhvJ9NDq/kh8mR9 nZGthuJpEQkBlpJ0hU00zmDF1IBzc3A63rOwNZ5Q/NzQLWfQb+JuVGfTk5VW/71M OyqcyMvvVSHlqB2vYvHelxcpC+trskX/3XCw9n22aJyvTLbtCbL6AkoGmQ4QuIo7 zXHiPHy3bKMprizwMZcdDJhs4uLiiNvQY4ecqEvWNk45ogzUhQzRwpvVohA3blz1 5DoeMhIgJFk= =0MXJ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce