Red Hat Security Advisory 2021-0428-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include a privilege escalation vulnerability.
b9ce790b067b7f1b30b7506e8562a60ed5b8b2aa99d61302c24633939ba16813
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: OpenShift Container Platform 4.5.33 bug fix and security update
Advisory ID: RHSA-2021:0428-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2021:0428
Issue date: 2021-03-03
CVE Names: CVE-2021-3344
====================================================================
1. Summary:
Red Hat OpenShift Container Platform release 4.5.33 is now available with
updates to packages and images that fix several bugs and add enhancements.
This release also includes a security update for Red Hat OpenShift
Container Platform 4.5.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing
Kubernetes application platform solution designed for on-premise or private
cloud deployments.
Security Fix(es):
* openshift/builder: privilege escalation during container image builds via
mounted secrets (CVE-2021-3344)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
This advisory contains the container images for Red Hat OpenShift Container
Platform 4.5.33. See the following advisory for the RPM packages for this
release:
https://access.redhat.com/errata/RHSA-2021:0429
Space precludes documenting all of the container images in this advisory.
See the following Release Notes documentation, which will be updated
shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-rel
ease-notes.html
You may download the oc tool and use it to inspect release image metadata
as follows:
(For x86_64 architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.5.33-x86_64
The image digest is
sha256:8e6b3ffc19aa6106096936733a128095646a604b69924b5cf606260d433661f0
(For s390x architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.5.33-s390x
The image digest is
sha256:c7085a4d27da05bd733e5ad72b74f6a1b55548badeb71ce050e88baaf4fcf575
(For ppc64le architecture)
$ oc adm release info
quay.io/openshift-release-dev/ocp-release:4.5.33-ppc64le
The image digest is
sha256:102c2dff98f2dab4cf975a02b3cf9fa24ce1e0e10650113e94e5d07420ac10d3
All OpenShift Container Platform 4.5 users are advised to upgrade to these
updated packages and images when they are available in the appropriate
release channel. To check for available updates, use the OpenShift Console
or the CLI oc command. Instructions for upgrading a cluster are available
at
https://docs.openshift.com/container-platform/4.5/updating/updating-cluster
- -between-minor.html#understanding-upgrade-channels_updating-cluster-between
- -minor.
3. Solution:
For OpenShift Container Platform 4.5 see the following documentation, which
will be updated shortly for this release, for important instructions on how
to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.5/release_notes/ocp-4-5-rel
ease-notes.html
Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.5/updating/updating-cluster
- -cli.html.
4. Bugs fixed (https://bugzilla.redhat.com/):
1849154 - [4.5] readinessEndpoint not using trustedCA for trust validation
1877346 - KubeAPIErrorsHigh firing due to "too large resource version"
1879208 - APIServer panic'd: net/http: abort Handler
1879901 - [release 4.5] Top-level cross-platform: Fix bug in reflector not recovering from "Too large resource version"
1884195 - Possible to delete 2 masters simultaneously if kubelet unreachable
1887763 - [release 4.5] Gather MachineConfigPools
1889679 - [release 4.5] Gather top installplans and their count
1891455 - EgressNetworkPolicy does not work when setting Allow rule to a dnsName
1891545 - [release 4.5] Add ContainerRuntimeConfig gatherer
1892372 - operator pod with OLM webhooks is getting terminated and created several times during the installation
1894243 - [Backport 4.5] IO archive contains more records of than is the limit
1896079 - Package Server is in 'Cannot update' status despite properly working
1904584 - Operator upgrades can delete existing CSV before completion
1905576 - [4.5] Changing the bound token service account issuer invalids previously issued bound tokens
1905991 - [release-4.5] Detecting broken connections to the Kube API takes up to 15 minutes
1914255 - Red Hat image and crashlooping OpenShift pod collection
1916660 - AggregatedAPIDown permanently firing after removing APIService
1916859 - configs.imageregistry.operator.openshift.io cluster does not update its status fields after URL change
1918962 - [IPI on vsphere] Executing 'openshift-installer destroy cluster' leaves installer tag categories in vsphere
1920421 - Too many haproxy processes in default-router pod causing high load average
1920676 - Must-gather and inspect should put a timestamp when it started and finished into the tar
1921283 - fix MCS blocking iptables rules
1921450 - CVE-2021-3344 openshift/builder: privilege escalation during container image builds via mounted secrets
1921484 - Regression OLM uses scoped client for CRD installation
1922262 - [4.5.z] real-time kernel in RHCOS is not synchronized
1924137 - Increase initialDelaySeconds for ovs-daemons container in the ovs-node daemonset for upgrade scenarios
1924913 - A valid etcd endpoint should have the URL scheme prepended
1925678 - Placeholder bug for OCP 4.5.z rpm release
1925679 - Placeholder bug for OCP 4.5.z extras release
1925680 - Placeholder bug for OCP 4.5.z metadata release
1926564 - [release-4.5] OCP installs fail on ppc64le/s390x in the bootstrap phase
1926730 - Large number of tcp connections with shiftstack ocp cluster in about 24 hours
1928263 - catalog operator causing CPU spikes and bad etcd performance
5. References:
https://access.redhat.com/security/cve/CVE-2021-3344
https://access.redhat.com/security/updates/classification/#important
6. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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0+JU
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce