Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.2598 OpenShift Container Platform 4.6.58 bug fix and security update 27 May 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: OpenShift Container Platform 4.6.58 Publisher: Red Hat Operating System: Red Hat Resolution: Patch/Upgrade CVE Names: CVE-2022-1677 CVE-2022-1271 CVE-2018-25032 Original Bulletin: https://access.redhat.com/errata/RHSA-2022:2264 Comment: CVSS (Max): 8.2 CVE-2018-25032 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H) CVSS Source: Red Hat Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenShift Container Platform 4.6.58 bug fix and security update Advisory ID: RHSA-2022:2264-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2022:2264 Issue date: 2022-05-26 CVE Names: CVE-2018-25032 CVE-2022-1271 CVE-2022-1677 ===================================================================== 1. Summary: Red Hat OpenShift Container Platform release 4.6.58 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.6.58. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHSA-2022:2263 Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes: https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html Security Fix(es): * openshift/router: route hijacking attack via crafted HAProxy configuration file (CVE-2022-1677) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. You may download the oc tool and use it to inspect release image metadata as follows: (For x86_64 architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.6.58-x86_64 The image digest is sha256:e676ad0708b6e7c8988a368977bf12036f7359f34339fdc9b2f225109b0855dd (For s390x architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.6.58-s390x The image digest is sha256:ef210c5e204aa6368db81f97798c1a84d45c0cdea963d7b3ab9e3f2e77015e19 (For ppc64le architecture) $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.6.58-ppc64le The image digest is sha256:af5771434cbf56a12886791440e12179c87262da1dbf79989fe45e42ccd89895 All OpenShift Container Platform 4.6 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html 3. Solution: "For OpenShift Container Platform 4.6 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.6/updating/updating-cluster-cli.html" 4. Bugs fixed (https://bugzilla.redhat.com/): 2076211 - CVE-2022-1677 openshift/router: route hijacking attack via crafted HAProxy configuration file 2078667 - periodic-ci-openshift-release-master-ci-4.7-upgrade-from-stable-4.6-e2e-aws-uwm is permfailing 2080219 - Cluster destroy fails when using byo with Kuryr and there is no pre-created router 5. References: https://access.redhat.com/security/cve/CVE-2018-25032 https://access.redhat.com/security/cve/CVE-2022-1271 https://access.redhat.com/security/cve/CVE-2022-1677 https://access.redhat.com/security/updates/classification/#moderate 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYo/qKdzjgjWX9erEAQj4aw//fdEzJbQzklsEyLcDfVu9aFJCxBIKTMNq c+/L7uhOQECYzYVn3GlM1EBrd6VCpGISuaBOinLGTUSMNq1jEz09VUmtJCqmn0w7 OB/WjcF10MVSXFxkHmzo08vJVsNMSrawInJzOByZKNuSDytVbfBVzPIUxfm8lub1 fJf0eJ5iGdzUlDu7t2U4/9k27dV7diIwmk8RRofdjHfdDYXvUAEfsDuEtrrIA7dD S/arOIURbp9Aj6ob89iaidFZDdtDN1DCriJVa6RviJGKm9od88OG7McdfD55uWUW PO7VxlRpa69a37tf6VM7fCj4ir70AlyYKohrVwNNzU7QXLJ0vJzPvkvY4ClhtY1Q jyUwnVLgJk4vcIxVAX3ObPz71jvyWOdaU3t3fWoInI26RSGUUqh4MqQabjWp2Yhc wReZw9lKkTxRm+LE6ZlJ2VprPwaqf93zfvuHzxLEgOPIO3z2BiSKLbEFtJemqhj3 rUA3mV90o80I9ATqmgRqspTl4JHzHF54wWdlKXVwzXyiCCPpnB8WAd9yrX3SfEhT qDagw1vDX8RT5HBkbFLSIxIiJtBaBnMe4InzyPncPHMdjlV9NlIiBf3K97p9bIzD JBW5nUUxZmUzi1rP6eHFvwz+7LzfzEYabSeO5+unXSYbOtwv8MhXvMdA4dyq/Pmb Bb7eo9GTqew= =/HTV - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBYpAPb8kNZI30y1K9AQjmshAAm9LVcQzj5hk7illi8RkbNGn7Rwn7czNo OrY6J6/T/D1jkVxc9G/sHyqerRCCAjD8yxPXkj5DORFr6ITy/tuOK+Szzz94Y6zS C8ujBR1Vijmbl3YfSUR+Lk97z57JUQ4oF/Q+kRsI7Kwb5p4mzMBPprIQioJNJOFj 2L1OZ78pn3PFoxeLpYMtDkOjcRessy5wgkk9MHcaUnHOymB1pJZdZzu/WhDwV5iN M0rmzteJe9HPe2aMNlcQpPMX76Smv0jCtGox3X2Mk3PdUslnT4EkcSOi5HEsK84T e82XxCtZQLIDRdkL36qUf8jrMxdxgI+iQCjzypKpP4SiEnvshllfPgtW3HfdBHmX cQZgWCKOS5yVBVXdI20msV9dCsubumoOwG/6LRn8Pn2SDDqkRz0NgcmgZQXHwHLL c6ed3nR/IiScavA3+38Ftf07OVU5osZ4PK4mNLG5qmDtPztSAZzbZe/9SgvIhUcF mzgjXwiMPQcOK7daMY/lx4eIwYZUysQwBaCdwV9ihdhiwKF9Vtrh131toxoruN9P lxkec58cnnr2r4lOTbNAMcXikotZiKw81bQZhY4nxzUaAUmJCuk55nwxg1lDWQuv YyLN7uHzhpWFH+AeGXFyLG4LyxQySOhKX87ZBprbG/iveMGo6CrixOU+nD7CUZ8E Iulh1TBvJ0E= =x2V/ -----END PGP SIGNATURE-----